Al-Khassaweneh et al., 2013 - Google Patents
A value transformation and random permutation-based coloured image encryption techniqueAl-Khassaweneh et al., 2013
- Document ID
- 4783320247713225093
- Author
- Al-Khassaweneh M
- Tawalbeh S
- Publication year
- Publication venue
- International Journal of Information and Computer Security
External Links
Snippet
With the recent advances in multimedia transmission and storage, security becomes an important issue to protect data from unauthorised access. There are several methods proposed to secure data including watermarking, encryption, steganography and others …
- 230000001131 transforming 0 title abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Talhaoui et al. | Fast image encryption algorithm with high security level using the Bülban chaotic map | |
| Zhou et al. | A novel image encryption algorithm based on chaos and Line map | |
| Zhang et al. | Entropy‐based block scrambling image encryption using DES structure and chaotic systems | |
| Song et al. | An image encryption scheme based on new spatiotemporal chaos | |
| Norouzi et al. | A novel image encryption based on hash function with only two-round diffusion process | |
| Zhang et al. | A novel image encryption method based on total shuffling scheme | |
| US11507705B2 (en) | Determining cryptographic operation masks for improving resistance to external monitoring attacks | |
| Mirzaei et al. | A new image encryption method: parallel sub-image encryption with hyper chaos | |
| Abdo et al. | A cryptosystem based on elementary cellular automata | |
| Wang et al. | Cryptanalysis of an image encryption algorithm using Chebyshev generator | |
| Panduranga et al. | Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher | |
| Lone et al. | A novel image encryption using random matrix affine cipher and the chaotic maps | |
| Gafsi et al. | Efficient encryption system for numerical image safe transmission | |
| US20150215117A1 (en) | White box encryption apparatus and method | |
| He et al. | A novel image encryption algorithm based on the delayed maps and permutation‐confusion‐diffusion architecture | |
| US11418334B2 (en) | Protecting modular inversion operation from external monitoring attacks | |
| Liu et al. | A color image encryption scheme based on a novel 3d chaotic mapping | |
| Lambić | Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map | |
| Mishra et al. | A New algorithm of encryption and decryption of images using chaotic mapping | |
| JPWO2016088453A1 (en) | Encryption device, decryption device, encryption processing system, encryption method, decryption method, encryption program, and decryption program | |
| Sun et al. | A secure image encryption based on spatial surface chaotic system and AES algorithm | |
| Guanghui et al. | Chaotic Image Encryption Based on Running‐Key Related to Plaintext | |
| Cheng et al. | A High‐Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy | |
| Zhang | A chaotic system based image encryption algorithm using plaintext-related confusion | |
| JP6194136B2 (en) | Pseudorandom number generation device and pseudorandom number generation program |