• Nenhum resultado encontrado

[PDF] Top 20 Chaos Image Encryption Using Transposition and Pixel Shuffling

Has 10000 "Chaos Image Encryption Using Transposition and Pixel Shuffling" found on our website. Below are the top 20 most common "Chaos Image Encryption Using Transposition and Pixel Shuffling".

Chaos Image Encryption Using Transposition and Pixel Shuffling

Chaos Image Encryption Using Transposition and Pixel Shuffling

... inside and outside the home-office environment has led to an increased demand for effective encryption ...of encryption technology comes out in more pronounced way when there is no absolute relation ... See full document

7

Image Encryption using chaos functions and fractal key

Image Encryption using chaos functions and fractal key

... capabilities and features of hyper chaos functions such as sensitivity to initial values, random behavior, non-periodic and certainty which lead to pseudo-random numbers and in order to ... See full document

8

Design and Implementation of Image Encryption Algorithm Using Chaos

Design and Implementation of Image Encryption Algorithm Using Chaos

... transmitting and storing images. So maintaining the confidentiality and integrity of images has become a major ...makes encryption necessary. The pixel values of neighbouring pixels in a plain ... See full document

5

Efficiency and Security of Some Image Encryption Algorithms

Efficiency and Security of Some Image Encryption Algorithms

... A. Transposition Techniques (Position Permutation) Transposition means rearranging elements in the plain- ...bit, pixel, and block permutations ...pixels and blocks produce high level ... See full document

4

Chaos, anti-chaos and resources: dealing with complexity

Chaos, anti-chaos and resources: dealing with complexity

... Grabinski also points that the nonlinearity is the main characteristic of a chaotic situation. Mathematically, the nonlinear functions to be considered chaotic should be based on variables with some resistance. The ... See full document

8

Analysis of Kernel Approach in Fuzzy-Based  Image Classifications

Analysis of Kernel Approach in Fuzzy-Based Image Classifications

... identification, and classification of land covers with improved accuracy and ...supervised and unsupervised methods have been developed for multi- and hyper spectral image ... See full document

7

Access And Monitoring WLAN Using Mobile Application

Access And Monitoring WLAN Using Mobile Application

... Monitoring and Control Using Mobile App Embedded Wireless Information WAP (Wireless Applications Protocol) was designed for remedy of the problems with using web servers in wireless networks ... See full document

4

2D Sub-Pixel Disparity Measurement Using QPEC / Medicis

2D Sub-Pixel Disparity Measurement Using QPEC / Medicis

... Dicho2D and Dicho1D in Table 1 are directly linked to the line mismatches that exist in the Medicis 2D search, while working on a pair in epipolar ...1.27 and its maximum by a factor ... See full document

8

LARGE SCALE URBAN RECONSTRUCTION FROM REMOTE SENSING IMAGERY

LARGE SCALE URBAN RECONSTRUCTION FROM REMOTE SENSING IMAGERY

... the image information and compute a depth for each single image pixel - compared to sparse multiview im- age matching methods based on SIFT- (Lowe, 2004) or SURF- like (Bay et ...each ... See full document

8

Practical Isolated Searchable Encryption in a Trusted Computing Environment

Practical Isolated Searchable Encryption in a Trusted Computing Environment

... data and computations on the Cloud server without interfering; such model implies that sensitive data can never be decrypted on the ...property-preserving and SSE schemes, this can imply several rounds of ... See full document

144

A NOVEL METHOD FOR AUTOMATION OF 3D HYDRO BREAK LINE GENERATION FROM LIDAR DATA USING MATLAB

A NOVEL METHOD FOR AUTOMATION OF 3D HYDRO BREAK LINE GENERATION FROM LIDAR DATA USING MATLAB

... detect and delineate water bodies using both LiDAR elevation and intensity ...rate and high intensity variation from water ...area and therefore hydro break line ...generated ... See full document

6

Analyzing the Efficiency of Text-to-Image  Encryption Algorithm

Analyzing the Efficiency of Text-to-Image Encryption Algorithm

... operations) and the modulus (0, 1, or 2) was used to determine the operation ...shift) and 2 (means reverse operation on the selected ...r1 and r2 were generated where r1 and r2 represent two ... See full document

4

Image Segmentation by Using Finite Bivariate Doubly Truncated Gaussian Mixture Model

Image Segmentation by Using Finite Bivariate Doubly Truncated Gaussian Mixture Model

... develop and analyze a segmentation method using Bivariate Finite doubly Truncated Gaussian Mixture Model and K-Means ...algorithm. Image Segmentation is used in many applications; with ... See full document

10

Biometric Authentication System using Non-Linear Chaos

Biometric Authentication System using Non-Linear Chaos

... constructed, and returned to the ...form, and then matched against an input ...form, and matched against a set of templates ...sources and encrypt and sign the data with their own ... See full document

9

Estimativa da massa corporal de bovinos por meio de sensor de profundidade Kinect®

Estimativa da massa corporal de bovinos por meio de sensor de profundidade Kinect®

... Com o desenvolvimento da comunicação entre o Kinect® e o computador, Coelho (2014) produziu um código que efetua a inicialização do Kinect e captura imagens por parte do mesmo. Para a obtenção das distâncias o Kinect ... See full document

50

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

... zero, and is not ...prime, and so is 2 4 +1, or 17, but 2 32 +1 is not prime, so IDEA cannot be trivially scaled up to a 128-bit block ...row and column will contain every number once only, forming a ... See full document

8

Color Image Reconstruction Using A New R'G'I Model

Color Image Reconstruction Using A New R'G'I Model

... digital image was discussed; this model can be used to separate low and high frequencies in the image without loosing any information from the ...microscopic image analysis and the ... See full document

5

J. Braz. Soc. Mech. Sci. & Eng.  vol.25 número3

J. Braz. Soc. Mech. Sci. & Eng. vol.25 número3

... digital image correlation, has been developed by Sutton et ...1991) and Bruck, et ...materials and evaluation of their mechanical properties (Zhang, Zhang and Cheng, 1999), and ... See full document

7

PSICIC: noise and asymmetry in bacterial division revealed by computational image analysis at sub-pixel resolution.

PSICIC: noise and asymmetry in bacterial division revealed by computational image analysis at sub-pixel resolution.

... preparation, and image acquisition have pushed light microscopy to its physical ...(PALM), and stochastic optical reconstruction microscopy (STORM) have increased spatial resolution further still ... See full document

10

WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

... secret pixel into m sub-pixels. The visual quality of reconstructed image is very poor by the ...secured image sharing scheme can recover the distortion levels very less in the secret image, ... See full document

8

Show all 10000 documents...