Li et al., 2018 - Google Patents
A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map.Li et al., 2018
View PDF- Document ID
- 10113897513306577499
- Author
- Li C
- Luo G
- Li C
- Publication year
- Publication venue
- Int. J. Netw. Secur.
External Links
Snippet
Image encryption has been a popular research field in recent decades. This paper presents a novel scheme for the preview of the encrypted image. Using the scheme can preview the encrypted-image before decryption. So we can get to know that this image is really needed …
- 230000000739 chaotic 0 title description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/28—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication using particular encryption algorithm
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ma et al. | Cryptanalysis of an image block encryption algorithm based on chaotic maps | |
Zhou et al. | A novel image encryption cryptosystem based on true random numbers and chaotic systems | |
Shankar et al. | Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm | |
Wang et al. | An image encryption scheme based on chaotic system and compressed sensing for multiple application scenarios | |
Usama et al. | Chaos-based secure satellite imagery cryptosystem | |
Li et al. | Chaotic image encryption using pseudo-random masks and pixel mapping | |
Ye et al. | An effective framework for chaotic image encryption based on 3D logistic map | |
Li et al. | An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map. | |
CN103248854B (en) | Based on the medical image encryption method of even scramble and chaotic maps | |
CN101739695A (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
Man et al. | A novel image encryption algorithm based on least squares generative adversarial network random number generator | |
CN106709854A (en) | Cat mapping and chaos based image information fusion and encryption method | |
Lone et al. | Encryption scheme for RGB images using chaos and affine hill cipher technique | |
Abdul-Hussein et al. | Secured Transfer and Storage Image Data for Cloud Communications. | |
Mir et al. | Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain | |
CN111130748A (en) | Quantum chaotic parallel image encryption method | |
Wen et al. | Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps | |
Su et al. | Visualized multiple image selection encryption based on log chaos system and multilayer cellular automata saliency detection | |
Liu et al. | A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography | |
Wang et al. | Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion | |
Mohamed et al. | Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system | |
CN106599703A (en) | Mixed primitive and chaos-based multi-image encryption method | |
Gao et al. | New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem | |
Kayani et al. | Privacy preserving content based image retrieval | |
Li et al. | A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map. |