大工至善|大学至真分享 http://blog.sciencenet.cn/u/lcj2212916

博文

[转载]【信息技术】【2016.01】增强型彩色图像加密技术

已有 740 次阅读 2021-3-20 16:15 |系统分类:科研笔记|文章来源:转载

图片

本文为约旦扎尔卡大学(作者:Fadi Nayef Al-Salameen)的硕士论文,共69页。

 

近年来,随着数字通信和多媒体应用的迅速发展,数字产品的网络通信频繁出现,数字图像的安全性成为一个重要的问题。其中一种方法是使用加密来确保图像的安全性;加密被用于许多领域,如社交媒体、医学和军事领域。加密技术和提供多媒体信息的算法是最基本的。加密算法发展迅速,许多图像加密方法被用来保护信息和多媒体数据不被未经授权的灰色图像访问,即,“将彩色图像转换为灰色图像,然后对其进行加密”。

 

本研究提出了一种有效的图像加密技术,该技术利用了RGB彩色图像中的红、绿、蓝(RGB)分量。所提出的技术旨在最小化加解密时间,减少源图像与解密图像之间的平方误差。实验结果表明,改进后的加密技术与“基于灰度图像的RGB彩色图像加解密”方法和“加密-解密”方法相比,大大缩短了加密时间。RGB彩色图像采用矩阵乘法,根据密钥大小加密/解密。所提出技术通过使用一个方阵密钥和两个向量密钥依次使用一组混淆和扩散过程,具有很高的保密性。为了防止黑客攻击,应用了随机密钥生成方法

 

Recently, the security of digital images becomes an important issue with the rapid growth of digital communication and multimedia applications due to the development of the communication of digital products through networks which occurs frequently. One of the ways is using encryption to ensure images security; encryption is used in many fields such as social media, medical science, and military scopes. Recent cryptography algorithms are providing essential techniques to protect information and multimedia data. Encryption algorithms have been growing quickly and many image encryption methods have been used to protect information and multimedia data from unauthorized access using gray images i.e. "converting colored images to gray images then encrypt it". This research presents effective techniques for image encryption which employs Red, Green and Blue (RGB) components of the RGB colored image. The proposed techniques aim to minimize the encryption-decryption time and reduce the square error between the source and the decrypted image. Evaluations of the proposed techniques were done using many images with different sizes, while the experimental results show that the improved encryption techniques reduce time greatly it compared with RGB Colored image Encryption-Decryption Using Gray Image method according to time of encryption/decryption, and with Encryption-Decryption RGB Color Image Using Matrix Multiplication according to the size of encryption/decryption key. The proposed techniques have a high confidentiality level through using set of confusion and diffusion process sequentially with a square matrix key and two vectors keys. In order to prevent hacking , a random key generation will be applied.

 

1.       引言

2. 文献回顾与相关工作

3. 本文所提出的技术

4. 实验评估

5. 结论与未来展望


更多精彩文章请关注公众号:205328s611i1aqxbbgxv19.jpg




https://wap.sciencenet.cn/blog-69686-1277761.html

上一篇:[转载]【信息技术】【2010】数字修复算法与评价
下一篇:[转载]【计算机科学】【2019.09】全基因组关联研究的深度学习和SNP位置影响
收藏 IP: 220.178.172.*| 热度|

0

该博文允许注册用户评论 请点击登录 评论 (0 个评论)

数据加载中...

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-4-19 22:41

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部