• Nenhum resultado encontrado

Design and Implementation of Image Encryption Algorithm Using Chaos

N/A
N/A
Protected

Academic year: 2017

Share "Design and Implementation of Image Encryption Algorithm Using Chaos"

Copied!
5
0
0

Texto

Loading

Referências

Documentos relacionados

In this paper we have used capabilities and features of hyper chaos functions such as sensitivity to initial values, random behavior, non-periodic and certainty

Visual cryptography is used along with the concept of halftoning where the continuous-tone image is first transformed into a binary image by using error diffusion

The algorithm encryption and decryption of an image transform an image into cipher code using the random keys, which allow users to have confidentiality and security in

The position of the data is scrambled in the order of randomness of the elements obtained from the chaotic map and again rearranged back to their original position in

Figure 14 (b) -(d) shows the Lena image encrypted by our proposed algorithm, the FT-based algorithm and the FRT-based algorithm; after 70% of pixels were cropped, the

Cryptography or sometimes referred to as encipherment is used to convert the plaintext to encode or make unreadable form of text [1]. The sensitive data are

The entropy of the watermarked image and correlation coefficient of extracted watermark image is very close to ideal values, proving the correctness of proposed

Some algorithms are proposed according to the characteristics of the image itself, such as Yuen’s proposal of a chaos-based joint image compression and encryption algorithm