• Nenhum resultado encontrado

Substitution-diffusion based Image Cipher

N/A
N/A
Protected

Academic year: 2016

Share "Substitution-diffusion based Image Cipher"

Copied!
12
0
0

Texto

Loading

Referências

Documentos relacionados

The prevalence of visible nipple shadow in a review of 1000 routine chest radiographs obtained from both genders without a nipple marker was about 10%.. 4 Some of these

Figure 14 (b) -(d) shows the Lena image encrypted by our proposed algorithm, the FT-based algorithm and the FRT-based algorithm; after 70% of pixels were cropped, the

The algorithm encryption and decryption of an image transform an image into cipher code using the random keys, which allow users to have confidentiality and security in

An attacker can examine the histogram of an encrypted image (red, green and blue) using the algorithms of attack and the statistical analysis of the encrypted image

Regarding the importance of normal image in defect image in defect detection and also importance of proper selection of normal image (which must have the same

Cryptography or sometimes referred to as encipherment is used to convert the plaintext to encode or make unreadable form of text [1]. The sensitive data are

The entropy of the watermarked image and correlation coefficient of extracted watermark image is very close to ideal values, proving the correctness of proposed

Some algorithms are proposed according to the characteristics of the image itself, such as Yuen’s proposal of a chaos-based joint image compression and encryption algorithm