• Nenhum resultado encontrado

[PDF] Top 20 Encryption and Decryption of Digital Image Using Color Signal

Has 10000 "Encryption and Decryption of Digital Image Using Color Signal" found on our website. Below are the top 20 most common "Encryption and Decryption of Digital Image Using Color Signal".

Encryption and Decryption of Digital Image Using Color Signal

Encryption and Decryption of Digital Image Using Color Signal

... level of security and secrecy provided by the digital color signal-based image ...The image encryption and decryption algorithm is designed and ... See full document

5

A Novel Effective Secure and Robust CDMA Digital Image Watermarking in YUV Color Space Using DWT2

A Novel Effective Secure and Robust CDMA Digital Image Watermarking in YUV Color Space Using DWT2

... host image is converted into YUV channels; then, the Y channel is decomposed into wavelet ...security of watermark, the watermark W is converted to a sequence and then a random binary sequence R ... See full document

9

Color Image Reconstruction Using A New R'G'I Model

Color Image Reconstruction Using A New R'G'I Model

... new color model for digital image was discussed; this model can be used to separate low and high frequencies in the image without loosing any information from the ...different ... See full document

5

Comparison Fractal Color Image Compression using YIQ and YUV Color Model

Comparison Fractal Color Image Compression using YIQ and YUV Color Model

... YUV color space defines is a term of one luminance (Y channel) and two chrominance components (UV ...the color difference between blue signal and luminance (B−Y) and V ... See full document

5

Substitution-diffusion based Image Cipher

Substitution-diffusion based Image Cipher

... Security of images has become very important for many applications like video conferencing, secure facsimile, medical, military applications ...- digital watermarking and ...communications ... See full document

12

An image encryption algorithm utilizing julia sets and hilbert curves.

An image encryption algorithm utilizing julia sets and hilbert curves.

... kinds of image encryption techniques, including image-scrambling-based techniques, data- processing-based techniques, key-based encryption techniques, ...the encryption of ... See full document

9

AN EFFICIENT CONTENT BASED IMAGE RETRIEVAL USING COLOR AND TEXTURE OF IMAGE SUBBLOCKS

AN EFFICIENT CONTENT BASED IMAGE RETRIEVAL USING COLOR AND TEXTURE OF IMAGE SUBBLOCKS

... in image processing, pattern recognition, and computer ...purpose of effectively retrieving more similar images from the digital image databases, this paper uses the local HSV ... See full document

9

ALGORITHM FOR IMAGE MIXING AND ENCRYPTION

ALGORITHM FOR IMAGE MIXING AND ENCRYPTION

... pairs of 40 different images of various types, with sizes ranging from 10 to 2000 kilobytes ...same image pair, they produced different encrypted ...analysis using histograms, correlation ... See full document

7

A Refined Hybrid Image Retrieval System using Text and Color

A Refined Hybrid Image Retrieval System using Text and Color

... An image retrieval system is a computer system for browsing, searching and retrieving images from a large database of digital images [1, ...creation of large image datasets due ... See full document

9

Data Hiding and Retrival Using Advanced Encryption and  Decryption Algorithms Mamtha Shetty, Shreedhar. A. Joshi

Data Hiding and Retrival Using Advanced Encryption and Decryption Algorithms Mamtha Shetty, Shreedhar. A. Joshi

... type of 2 dimensional matrix barcode, which gained popularity because of its large capacity to hold digital data and it can be integrated in any mobile ...1997 and ISO/IEC Standard in ... See full document

4

J. Braz. Chem. Soc.  vol.17 número1

J. Braz. Chem. Soc. vol.17 número1

... one of the scanned images that included the reference paper and two different ...The color components were evaluated using the Digital Micrograph program [Gatan, ...steps of the ... See full document

6

Image Information Retrieval From Incomplete Queries Using Color and Shape Features

Image Information Retrieval From Incomplete Queries Using Color and Shape Features

... based image retrieval (CBIR) is the task of searching digital images from a large database based on the extraction of features, such as color, texture and shape of the ... See full document

8

Increasing Security by Implementing Image Encryption using AES Algorithm

Increasing Security by Implementing Image Encryption using AES Algorithm

... use of image and video applications has increased dramatically in recent ...because of limited bandwidth. On the other hand, encryption operation is also performed if it is necessary to ... See full document

4

Compressed Sensing Based Encryption Approach for Tax Forms Data

Compressed Sensing Based Encryption Approach for Tax Forms Data

...  Decryption of the message will be achieved using a greedy algorithm (either orthogonal matching pursuit (OMP), or matching pursuit (MP), or greedy LS ...For decryption, it is necessary to ... See full document

6

Proposed Hyperchaotic System for Image Encryption

Proposed Hyperchaotic System for Image Encryption

... audio, and video has become significantly more important, since communications of digital products over the network (wired/wireless) has expanded ...data and its transmission and also ... See full document

4

Multi-pixel Visual Cryptography for color images with Meaningful Shares

Multi-pixel Visual Cryptography for color images with Meaningful Shares

... black and white images (Basic) introduced by Naor and Shamir ...as image and encryption is performed using simple algorithm to generate n copies of shares depending on ... See full document

10

Secure Image Encryption Based On a Chua Chaotic Noise Generator

Secure Image Encryption Based On a Chua Chaotic Noise Generator

... secure image cryptography telecom system based on a Chua's circuit chaotic noise ...unpredictable and complex ...tolerance of the circuit components, make CTRNGs ideal for ...input image with ... See full document

14

Reconstructed Color Image Segmentation

Reconstructed Color Image Segmentation

... new color model for digital image, which can be used to separate low, and high frequencies in the image without loosing any information from the image ...to image ... See full document

4

Image Encryption using chaos functions and fractal key

Image Encryption using chaos functions and fractal key

... growth of image transmission on computer networks and Internet, digital image security has been very ...to image transmission, secure and fast algorithms are required for ... See full document

8

A Block Cipher using Rotation and Logical XOR Operations

A Block Cipher using Rotation and Logical XOR Operations

... Encryption is the process of converting a plaintext message into cipher text which can be decoded back into the original message using the secret ...An encryption/ decryption ... See full document

6

Show all 10000 documents...