• No results found

[PDF] Top 20 Selective Image Encryption with 3D Chaotic Map

Has 10000 "Selective Image Encryption with 3D Chaotic Map" found on our website. Below are the top 20 most common "Selective Image Encryption with 3D Chaotic Map".

Selective Image Encryption with 3D Chaotic Map

Selective Image Encryption with 3D Chaotic Map

... of selective or partial encryption of human face images based on discrete cosine transform and AES stream cipher use Variable Length Coding(VLC)method of the Huffman’s vector, they found that it can be ... See full document

17

Image Encryption Using Chaotic Map and Prime modulo Multiplicative Linear Congruential Generator

Image Encryption Using Chaotic Map and Prime modulo Multiplicative Linear Congruential Generator

... the encryption. A good encryption scheme should be sensitive to the secret keys, and the key space should be large enough to make brute-force attacks ...proposed encryption algorithm uses three ... See full document

7

Chaos Based Image Encryption and Decryption

Chaos Based Image Encryption and Decryption

... plain image to large scale pixels in the ciphered image and thus differential attack may be practically ...project, chaotic logistic map is employed as the key stream ... See full document

6

An Efficient Image Encryption Technique Using RGB Pixel Displacement and Simple Chaotic Map

An Efficient Image Encryption Technique Using RGB Pixel Displacement and Simple Chaotic Map

... color image encryption using Logistic and Ikeda map. The chaotic sequences are generated using these chaotic maps and, according to the transformation of chaotic sequences, the ... See full document

12

A new physiology image encryption algorithm based on two dimensional coupled chaotic Map

A new physiology image encryption algorithm based on two dimensional coupled chaotic Map

... as image and audio, have been widely transmitted in Internet and mobile ...as image, audio, and video are easy to process, copy and transfer, the emergence of powerful tools raises a series of ...classic ... See full document

9

A robust and efficient scheme for image
encryption-decryption

A robust and efficient scheme for image encryption-decryption

... an image I = f(x, y) of size MXN consists of three primary color channels ...the image size to be N X N. As presented in [1], the image encryption and decryption algorithms in this work are ... See full document

5

Encryption then Compression Based on Image Fusion, Chaotic Map and DNA Subsequence Operation

Encryption then Compression Based on Image Fusion, Chaotic Map and DNA Subsequence Operation

... only encryption technique leads to weaker encrypted ...use image encryption based on DNA Subsequence Operation along with the use of chaotic map and image ... See full document

5

Image Encryption using Modified 4 out of 8 Code and Chaotic Map

Image Encryption using Modified 4 out of 8 Code and Chaotic Map

... digital chaotic encryption is the selection of the map. Chaotic maps have different behavior regarding com- plexity, chaotic properties cycle length, chaotic interval, periodic ... See full document

6

Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes

Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes

... A second example where compression of encrypted vi- sual data is desirable is data transmission over heterogeneous networks, for example, a transition from wired to wireless networks with corresponding decreasing ... See full document

16

A novel biological image encryption algorithm based on two dimensional Feigenbaum chaotic map

A novel biological image encryption algorithm based on two dimensional Feigenbaum chaotic map

... of image encryption and information security is an important frontier subject of e nonlinear science and information ...based image encryption scheme have been developed in recent years which ... See full document

10

High Security Nested PWLCM Chaotic Map Bit Level Permutation Based Image Encryption

High Security Nested PWLCM Chaotic Map Bit Level Permutation Based Image Encryption

... two chaotic maps to encrypt the image to enhance the ...employed chaotic maps and other method to encrypt the ...logistic chaotic maps and a large enough external secret keys for image ... See full document

9

Image encryption algorithm based on chaotic mapping

Image encryption algorithm based on chaotic mapping

... Abstrak. Imej digunakan dalam pelbagai bidang seperti perubatan, ketenteraan, sains, kejuruteraan, kesenian, hiburan, pengiklanan, pendidikan dan latihan. Dengan bertambahnya penggunaan teknik digital bagi penghantaran ... See full document

12

INTERACTING THROUGH DISCLOSING: PEER INTERACTION PATTERNS BASED ON 
SELF DISCLOSURE LEVELS VIA FACEBOOK

INTERACTING THROUGH DISCLOSING: PEER INTERACTION PATTERNS BASED ON SELF DISCLOSURE LEVELS VIA FACEBOOK

... for encryption turns out to be an urgent need and the chaos theory grows until it is approved by the cryptographers of the time until the ...in Chaotic cryptography in chaotic cryptography was ... See full document

13

Analysis and Improvement of Image Encryption Algorithm Based Translation Chaotic System

Analysis and Improvement of Image Encryption Algorithm Based Translation Chaotic System

... to image encryption, in 1997 ...new encryption algorithm based on Arnold cat mapping ...existing image encryption system based on chaos includes two stages: substitution and ... See full document

5

Tinkerbell Maps based Image Encryption using Magic Square

Tinkerbell Maps based Image Encryption using Magic Square

... for image encryption uses Tinkerbell chaotic maps and magic ...the encryption process. It mainly consists of a secret key, 2D Tinkerbell map generation, row shifting, pixel ... See full document

7

IMAGE ENCRYPTION USING CHAOTIC MAPS

IMAGE ENCRYPTION USING CHAOTIC MAPS

... Development of society leads towards the importance of data used, so huge amounts of digital visual data is stored on various media and exchange over various sorts of networks now a day .Image have enough ... See full document

6

Image Encryption Based on Permutation and Substitution Using Clifford Chaotic System and Logistic Map

Image Encryption Based on Permutation and Substitution Using Clifford Chaotic System and Logistic Map

... Cat map and Chen's chaotic system for pixel position permutation and pixel value masking, in 2005 respectively ...an image encryption system using strange attractor in ...of chaotic ... See full document

18

Novel Image Encryption Algorithm Based on Chaotic Map and Encoding

Novel Image Encryption Algorithm Based on Chaotic Map and Encoding

... In the suggested algorithm in [6], each pixel is substituted for another pixel, which is determined as follows. First, the original pixel is divided into two parts. In the following, a s-box, which is based on Logistic ... See full document

6

Chaos-Based Image Encryption Using an        Improved Quadratic Chaotic Map

Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map

... of chaotic systems are the deterministicity, the sensitivity to initial conditions and parameters and the ...that chaotic systems have some determining mathematical equations ruling their ...a ... See full document

13

Research on digital image encryption algorithm based on double logistic chaotic map

Research on digital image encryption algorithm based on double logistic chaotic map

... the chaotic system that the chaotic system is very sensitive to the initial ...the encryption results, the encryption algo- rithm or the cryptographic system has a better encryption ... See full document

10

Show all 10000 documents...