• Nenhum resultado encontrado

[PDF] Top 20 Proposed Hyperchaotic System for Image Encryption

Has 10000 "Proposed Hyperchaotic System for Image Encryption" found on our website. Below are the top 20 most common "Proposed Hyperchaotic System for Image Encryption".

Proposed Hyperchaotic System for Image Encryption

Proposed Hyperchaotic System for Image Encryption

... been proposed to meet these ...data encryption systems and exhibit some drawbacks and weakness in high stream data ...the encryption of large-scale image encryption are seen to suffer ... See full document

4

Design and Implementation of Image Encryption Algorithm Using Chaos

Design and Implementation of Image Encryption Algorithm Using Chaos

... of encryption and decryption of images using chaos is ...is proposed, in which the plain- image is decomposed into 8x8 size blocks and a different chaotic maps are applied in three different ways to ... See full document

5

Secure Image Encryption Based On a Chua Chaotic Noise Generator

Secure Image Encryption Based On a Chua Chaotic Noise Generator

... secure image cryptography telecom system based on a Chua's circuit chaotic noise ...chaotic system based on synchronised Master–Slave Chua's circuits has been used as a chaotic true random number ... See full document

14

Image Encryption using chaos functions and fractal key

Image Encryption using chaos functions and fractal key

... of image transmission on computer networks and Internet, digital image security has been very ...to image transmission, secure and fast algorithms are required for image ...Novel ... See full document

8

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

... of image data from unauthorized access is important and ...of image encryption and hiding [1].Samson and Sastry proposed Cryptographic of Image Using Modern Advanced Hill Cipher ... See full document

6

Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control

Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control

... The hyperchaotic Xu system (26) and hyperchaoticsystem (26) are globally and exponentially synchronized with the active nonlinear controller (30), where the gains k i , ( i = 1, 2, 3, 4) ... See full document

15

Age and gender classification: a proposed system

Age and gender classification: a proposed system

... In 2016, K. Zhang et al. proposed a new approach using three cascaded CNN, each one with a specific purpose, which feeds their candidates to the next CNN [21]. All three use non maximum suppression and bounding ... See full document

69

CONVERTIBLE DRM SYSTEM BASED ON IDENTITY-BASED ENCRYPTION

CONVERTIBLE DRM SYSTEM BASED ON IDENTITY-BASED ENCRYPTION

... was proposed by Shamir [11] [12] in 1979 and 1984, but the first practical identity-based encryption (IBE) scheme was proposed by Boneh and Franklin [13] until ... See full document

11

Multimodal Face and Finger Vein Biometric Recognition using ULBP and Repeated Line Tracking

Multimodal Face and Finger Vein Biometric Recognition using ULBP and Repeated Line Tracking

... recognition system is proposed based on face biometrics and finger vein pattern recognition ...face image feature extraction is performed using uniform local binary pattern ... See full document

4

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

... from encryption techniques. In this paper, we present a hybrid image protection scheme to establish a relation between the data encryption key and the ...different encryption keys by ... See full document

8

Original papers A feasibility cachaca type recognition using computer vision and pattern recognition

Original papers A feasibility cachaca type recognition using computer vision and pattern recognition

... we proposed a computer vision system with a wavelet ensemble for recognizing different types of Brazilian ...our proposed system is significantly cheaper, more effective, yields more accurate ... See full document

5

GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC CHEN SYSTEM BY SLIDING MODE CONTROL

GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC CHEN SYSTEM BY SLIDING MODE CONTROL

... In this paper, we derive new results based on the sliding mode control for the global chaos synchronization of identical hyperchaotic Chen systems (2005). The stability results for the sliding mode control based ... See full document

7

Scalable Evolutionary Computation for Efficient Information Extraction from Remote Sensed Imagery

Scalable Evolutionary Computation for Efficient Information Extraction from Remote Sensed Imagery

... The proposed system applies each candidate solution independently to the original multi- spectral image, which is stored in the cache distributed memory and contains the interested feature, in order ... See full document

8

Practical Isolated Searchable Encryption in a Trusted Computing Environment

Practical Isolated Searchable Encryption in a Trusted Computing Environment

... Haven The Haven framework (Baumann et al., 2014) aims to provide shielded execution guarantees for applications running on untrusted Cloud providers; such guarantees are similar to that of IEEs in regards to process ... See full document

144

Image Compression Algorithms for Fingerprint System

Image Compression Algorithms for Fingerprint System

... feature-based image matching, where minutiae ...fingerprint image and the input fingerprint image, and the number of corresponding minutiae pairings between the two images is used to recognize a ... See full document

6

Uniform and Non-Uniform Single Image Deblurring Based on Sparse Representation and Adaptive Dictionary Learning

Uniform and Non-Uniform Single Image Deblurring Based on Sparse Representation and Adaptive Dictionary Learning

... In [34], the authors proposed a refinement of the MP algorithm which improves convergence using an additional orthogonalization step. The orthogonal matching pursuit (OMP) is an improvement of the MP. The OMP ... See full document

14

Sba Controle & Automação  vol.17 número2

Sba Controle & Automação vol.17 número2

... The proposed system presents the advantages of using LEDs, such as robustness and long useful life, avoiding the use of magnetic components, EMI and ambient ...the system, making possible the ... See full document

8

Architecture for the Secret-Key BC3 Cryptography Algorithm

Architecture for the Secret-Key BC3 Cryptography Algorithm

... The encryption algorithms are classified into two types: secret-key and public- ...for encryption and decryption so this key must be kept ...for encryption and decryption ... See full document

16

Color Image Reconstruction Using A New R'G'I Model

Color Image Reconstruction Using A New R'G'I Model

... the proposed model has always a speed-up greater than 1 in different steps of processing such as: Direct conversion, inverse conversion and image stretching and image ... See full document

5

Chaotic Synchronization in Digital Communication

Chaotic Synchronization in Digital Communication

... the system. A system which uses chaotic signals as an alternative to pseudorandom signals is proposed which shows superiority of chaotic signals over pseudo random signals by simulation analysis ... See full document

4

Show all 10000 documents...