Image Encryption and Decryption Schemes Using Linear and Quadratic Fractal Algorithms and Their Systems

被引:0
|
作者
Kovalchuk, Anatoliy [1 ]
Izonin, Ivan [1 ]
Strauss, Christine [2 ]
Podavalkina, Mariia [1 ]
Lotoshynska, Natalia [1 ]
Kustra, Nataliya [1 ]
机构
[1] Lviv Polytech Natl Univ, Dept Publishing Informat Technol, Lvov, Ukraine
[2] Univ Vienna, Dept Elect Business, Vienna, Austria
关键词
encryption; decryption; fractal algorithm; contour; image; linear fractal; quadratic fractal; fractal algorithms system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image protection and organizing the associated processes is based on the assumption that an image is a stochastic signal. This results in the transition of the classic encryption methods into the image perspective. However the image is some specific signal that, in addition to the typical informativeness (informative data), also involves visual informativeness. The visual informativeness implies additional and new challenges for the issue of protection. As it involves the highly sophisticated modern image processing techniques, this informativeness enables unauthorized access. In fact, the organization of the attack on an encrypted image is possible in two ways: through the traditional hacking of encryption methods or through the methods of visual image processing (filtering methods, contour separation, etc.). Although the methods mentioned above do not fully reproduce the encrypted image, they can provide an opportunity to obtain some information from the image. In this regard, the encryption methods, when used in images, have another task - the complete noise of the encrypted image. This is required to avoid the use of visual imaging techniques. The paper describes the use of RSA algorithm elements in fractal quadratic transformations and fractal transform systems for encrypting / decrypting grayscale images. The values of pixel intensities in the matrix of such images are known to be in the range from 0 to 255. Noise functions in both methods were linear.
引用
收藏
页码:139 / 150
页数:12
相关论文
共 50 条
  • [1] Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes
    Wang, Yacheng
    Ikematsu, Yasuhiko
    Dung Hoang Duong
    Takagi, Tsuyoshi
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 487 - 501
  • [2] Data Encryption and Decryption Using image Steganography
    EC Department, SRMCEM, India
    Research Square, 1600,
  • [3] Image Encryption and Decryption Using SCAN Methodology
    Chen, Chao-Shen
    Chen, Rong-Jian
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 61 - +
  • [4] Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption
    Xing Zhang
    Yanpeng Zheng
    Zhaolin Jiang
    Heejung Byun
    Journal of Applied Mathematics and Computing, 2023, 69 : 1967 - 1987
  • [5] Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
    Zhou, Ri-Gui
    Wu, Qian
    Zhang, Man-Qun
    Shen, Chen-Yi
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (06) : 1802 - 1817
  • [6] Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
    Ri-Gui Zhou
    Qian Wu
    Man-Qun Zhang
    Chen-Yi Shen
    International Journal of Theoretical Physics, 2013, 52 : 1802 - 1817
  • [7] Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption
    Zhang, Xing
    Zheng, Yanpeng
    Jiang, Zhaolin
    Byun, Heejung
    JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2023, 69 (02) : 1967 - 1987
  • [8] An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations
    Kovalchuk, Anatoliy
    Izonin, Ivan
    Gregushml, Mihal
    Lotoshynska, Natalia
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 491 - 496
  • [9] Assessment of Encryption and Decryption Schemes for Secure Data Transmission in Healthcare Systems
    Adedeji, Kazeem B.
    Nwulu, Nnamdi I.
    Aigbavboa, Clinton
    Gbadamosi, Saheed L.
    2019 IEEE AFRICON, 2019,
  • [10] Optical encryption and decryption using personal fingerprint image
    Lee, SS
    Han, JW
    Seo, DI
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 413 - 415