+

Al-Khassaweneh et al., 2013 - Google Patents

A value transformation and random permutation-based coloured image encryption technique

Al-Khassaweneh et al., 2013

Document ID
4783320247713225093
Author
Al-Khassaweneh M
Tawalbeh S
Publication year
Publication venue
International Journal of Information and Computer Security

External Links

Snippet

With the recent advances in multimedia transmission and storage, security becomes an important issue to protect data from unauthorised access. There are several methods proposed to secure data including watermarking, encryption, steganography and others …
Continue reading at www.inderscienceonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant

Similar Documents

Publication Publication Date Title
Talhaoui et al. Fast image encryption algorithm with high security level using the Bülban chaotic map
Zhou et al. A novel image encryption algorithm based on chaos and Line map
Zhang et al. Entropy‐based block scrambling image encryption using DES structure and chaotic systems
Song et al. An image encryption scheme based on new spatiotemporal chaos
Norouzi et al. A novel image encryption based on hash function with only two-round diffusion process
Zhang et al. A novel image encryption method based on total shuffling scheme
US11507705B2 (en) Determining cryptographic operation masks for improving resistance to external monitoring attacks
Mirzaei et al. A new image encryption method: parallel sub-image encryption with hyper chaos
Abdo et al. A cryptosystem based on elementary cellular automata
Wang et al. Cryptanalysis of an image encryption algorithm using Chebyshev generator
Panduranga et al. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
Lone et al. A novel image encryption using random matrix affine cipher and the chaotic maps
Gafsi et al. Efficient encryption system for numerical image safe transmission
US20150215117A1 (en) White box encryption apparatus and method
He et al. A novel image encryption algorithm based on the delayed maps and permutation‐confusion‐diffusion architecture
US11418334B2 (en) Protecting modular inversion operation from external monitoring attacks
Liu et al. A color image encryption scheme based on a novel 3d chaotic mapping
Lambić Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map
Mishra et al. A New algorithm of encryption and decryption of images using chaotic mapping
JPWO2016088453A1 (en) Encryption device, decryption device, encryption processing system, encryption method, decryption method, encryption program, and decryption program
Sun et al. A secure image encryption based on spatial surface chaotic system and AES algorithm
Guanghui et al. Chaotic Image Encryption Based on Running‐Key Related to Plaintext
Cheng et al. A High‐Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Zhang A chaotic system based image encryption algorithm using plaintext-related confusion
JP6194136B2 (en) Pseudorandom number generation device and pseudorandom number generation program
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载