• Nenhum resultado encontrado

[PDF] Top 20 Image Encryption using chaos functions and fractal key

Has 10000 "Image Encryption using chaos functions and fractal key" found on our website. Below are the top 20 most common "Image Encryption using chaos functions and fractal key".

Image Encryption using chaos functions and fractal key

Image Encryption using chaos functions and fractal key

... objects and images means that each image or object which has this feature divided into small sections (on the basis of particular relevance), each of these subsections are a small copy of the original ... See full document

8

Substitution-diffusion based Image Cipher

Substitution-diffusion based Image Cipher

... based image encryption scheme using a key of 128-bit ...algorithm, image is partitioned into several key based dynamic blocks and each block is passed through the eight ... See full document

12

Fractal Fourier Transforms Based Image Authentication

Fractal Fourier Transforms Based Image Authentication

... optical encryption methods have been receiving increasing attention in recent years [15-18], double random phase encoding is one of them, which proposed by Refregier and Javidi [19], they used two random ... See full document

5

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

... Younes and Jantan introduced the concept of the block- based transformation encrypted image algorithm ...maps image encryption [8]. Wu et al studied and used the concept of Sadouka ... See full document

6

An image encryption algorithm utilizing julia sets and hilbert curves.

An image encryption algorithm utilizing julia sets and hilbert curves.

... of image encryption techniques, including image-scrambling-based techniques, data- processing-based techniques, key-based encryption techniques, ...the encryption of secret ... See full document

9

Design and Implementation of Image Encryption Algorithm Using Chaos

Design and Implementation of Image Encryption Algorithm Using Chaos

... of encryption and decryption of images using chaos is ...positions and changing the gray values of the pixels in the ...block and stream based shuffling scheme is proposed, in ... See full document

5

Chaos Image Encryption Using Transposition and Pixel Shuffling

Chaos Image Encryption Using Transposition and Pixel Shuffling

... secure image transmission over the internet. Internet is a public network and is not so secure for the transmission of confidential ...inside and outside the home – office environment has lead to an ... See full document

7

Multi-pixel Visual Cryptography for color images with Meaningful Shares

Multi-pixel Visual Cryptography for color images with Meaningful Shares

... Different kernels of halftone (Figure 3.9) are compared. Stucki kernel gives better halftone visual quality. Shares before watermark are random dots so it does not reveal the secret information. For better security, ... See full document

10

Add-On Security Model for Public-Key Cryptosystem Based on Magic Square Implementation

Add-On Security Model for Public-Key Cryptosystem Based on Magic Square Implementation

... the key stream in the one-time pad, the secret key in the DES algorithms, the prime p, and q in the RSA encryption ...size and the random in the sense that the probability of any ... See full document

5

Impact of Chaos Functions on Modern Swarm Optimizers.

Impact of Chaos Functions on Modern Swarm Optimizers.

... system and can experience any state according to its own regularity. Chaos has the ability of information processing that is applied widely in many fields like optimization problems, machine learning, ... See full document

26

Quality along the continuum: a health facility assessment of intrapartum and postnatal care in Ghana.

Quality along the continuum: a health facility assessment of intrapartum and postnatal care in Ghana.

... depth and breadth of an assessment, and the choice of tools is determined by both monetary and temporal ...time and budget, and our intention was to include all facilities in the study ... See full document

10

Secret Key Establishment for Symmetric Encryption over Adhoc Networks

Secret Key Establishment for Symmetric Encryption over Adhoc Networks

... stations and all the nodes in the network act as routers as well as hosts to facilitate the unconstrained ...routing and power-aware ...recipient and some other devices are not masquerading as a ... See full document

5

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling

... Obviously, restricting the size of s to a 2-member set will decrease the search and hence the encoding time considerably. To find a true estimation of s , a large number of experiments with an exhaustive search ... See full document

5

THE HORIZON OF PREDICTION FOR EXCHANGE RATE  EUR-LEU

THE HORIZON OF PREDICTION FOR EXCHANGE RATE EUR-LEU

... Identification of a suitable time delay is done by building auto-mutual information function and finding his first local minimum. I have conducted several simulations for different values of the embedding ... See full document

8

Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform

Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform

... (DCT) and discrete sine transform (DST) are used as key functions in many signal and image processing ...DCT and DST. Of these, the DCT-II, DST-II, DCT-IV, and DST-IV have ... See full document

7

Image Denoising with Modified Wavelets Feature Restoration

Image Denoising with Modified Wavelets Feature Restoration

... an image which has been degraded by a linear shift-invariant filtering operation with ...sensing and biomedical imaging as well as in everyday life for the enhancement of noisy ...linear image ... See full document

10

Novel Mechanism Control Algorithm for Wired Network

Novel Mechanism Control Algorithm for Wired Network

... server and clients using markovian model in bulk service rule of M/M ...while using M/M/(1,b)/1 bulk service rule, client request are to taken bulk service rule, client requests are taken to server ... See full document

6

Message Encryption Using Deceptive Text and Randomized Hashing

Message Encryption Using Deceptive Text and Randomized Hashing

... At the receiver the PIF is decrypted and the CPT is generated from the cheating text.The plaintext is generated by indexing PIF into the CPT.In this scheme we can also use digital sinatures to provide ... See full document

7

Analyzing the Efficiency of Text-to-Image  Encryption Algorithm

Analyzing the Efficiency of Text-to-Image Encryption Algorithm

... them into a single dimension array- (SS), the time required to fill the array of pixels into a two dimension array – filling pixels in a two dimensional array is necessary to perform matrix scrambling- (FT), the time ... See full document

4

A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

... hat, and the watermark extraction procedure detects and localizes the modification as shown in ...fighter, and it resulted in the output in ...Couple image by 1° clockwise. Every block of the ... See full document

8

Show all 10000 documents...