Nothing Special   »   [go: up one dir, main page]

Li et al., 2018 - Google Patents

A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map.

Li et al., 2018

View PDF
Document ID
10113897513306577499
Author
Li C
Luo G
Li C
Publication year
Publication venue
Int. J. Netw. Secur.

External Links

Snippet

Image encryption has been a popular research field in recent decades. This paper presents a novel scheme for the preview of the encrypted image. Using the scheme can preview the encrypted-image before decryption. So we can get to know that this image is really needed …
Continue reading at ijns.jalaxy.com.tw (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/28Cryptographic mechanisms or cryptographic arrangements for secret or secure communication using particular encryption algorithm
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Similar Documents

Publication Publication Date Title
Ma et al. Cryptanalysis of an image block encryption algorithm based on chaotic maps
Zhou et al. A novel image encryption cryptosystem based on true random numbers and chaotic systems
Shankar et al. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm
Wang et al. An image encryption scheme based on chaotic system and compressed sensing for multiple application scenarios
Usama et al. Chaos-based secure satellite imagery cryptosystem
Li et al. Chaotic image encryption using pseudo-random masks and pixel mapping
Ye et al. An effective framework for chaotic image encryption based on 3D logistic map
Li et al. An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map.
CN103248854B (en) Based on the medical image encryption method of even scramble and chaotic maps
CN101739695A (en) Three-dimensional Arnold mapping-based image grouping encryption method
Man et al. A novel image encryption algorithm based on least squares generative adversarial network random number generator
CN106709854A (en) Cat mapping and chaos based image information fusion and encryption method
Lone et al. Encryption scheme for RGB images using chaos and affine hill cipher technique
Abdul-Hussein et al. Secured Transfer and Storage Image Data for Cloud Communications.
Mir et al. Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain
CN111130748A (en) Quantum chaotic parallel image encryption method
Wen et al. Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps
Su et al. Visualized multiple image selection encryption based on log chaos system and multilayer cellular automata saliency detection
Liu et al. A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography
Wang et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion
Mohamed et al. Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system
CN106599703A (en) Mixed primitive and chaos-based multi-image encryption method
Gao et al. New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem
Kayani et al. Privacy preserving content based image retrieval
Li et al. A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map.