Image Encryption and Decryption Schemes Using Linear and Quadratic Fractal Algorithms and Their Systems

被引:0
|
作者
Kovalchuk, Anatoliy [1 ]
Izonin, Ivan [1 ]
Strauss, Christine [2 ]
Podavalkina, Mariia [1 ]
Lotoshynska, Natalia [1 ]
Kustra, Nataliya [1 ]
机构
[1] Lviv Polytech Natl Univ, Dept Publishing Informat Technol, Lvov, Ukraine
[2] Univ Vienna, Dept Elect Business, Vienna, Austria
关键词
encryption; decryption; fractal algorithm; contour; image; linear fractal; quadratic fractal; fractal algorithms system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image protection and organizing the associated processes is based on the assumption that an image is a stochastic signal. This results in the transition of the classic encryption methods into the image perspective. However the image is some specific signal that, in addition to the typical informativeness (informative data), also involves visual informativeness. The visual informativeness implies additional and new challenges for the issue of protection. As it involves the highly sophisticated modern image processing techniques, this informativeness enables unauthorized access. In fact, the organization of the attack on an encrypted image is possible in two ways: through the traditional hacking of encryption methods or through the methods of visual image processing (filtering methods, contour separation, etc.). Although the methods mentioned above do not fully reproduce the encrypted image, they can provide an opportunity to obtain some information from the image. In this regard, the encryption methods, when used in images, have another task - the complete noise of the encrypted image. This is required to avoid the use of visual imaging techniques. The paper describes the use of RSA algorithm elements in fractal quadratic transformations and fractal transform systems for encrypting / decrypting grayscale images. The values of pixel intensities in the matrix of such images are known to be in the range from 0 to 255. Noise functions in both methods were linear.
引用
收藏
页码:139 / 150
页数:12
相关论文
共 50 条
  • [21] A Novel Color Image Encryption Scheme Using Logistic Map and Quadratic Map Systems
    Herbadji, Djamel
    Belmeguenai, Aissa
    Derouiche, Nadir
    Zennir, Youcef
    Ouchtati, Salim
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11005 LNCS : 13 - 23
  • [22] Optical encryption using quadratic phase systems
    Unnikrishnan, G
    Singh, K
    OPTICS COMMUNICATIONS, 2001, 193 (1-6) : 51 - 67
  • [23] Image Encryption using chaos functions and fractal key
    Kashanian, Hooman
    Davoudi, Masoud
    Khorramfar, Hamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (10): : 87 - 92
  • [24] Image Encryption using chaos functions and fractal key
    Kashanian, Houman
    Davoudi, Masoud
    Khorramfar, Hamed
    INTERNATIONAL JOURNAL OF ADVANCED BIOTECHNOLOGY AND RESEARCH, 2016, 7 : 1075 - 1082
  • [25] Color image encryption and decryption using Hill Cipher associated with Arnold transform
    Ranjan, Rakesh
    Sharma, R. K.
    Hanmandlu, M.
    APPLICATIONS AND APPLIED MATHEMATICS-AN INTERNATIONAL JOURNAL, 2016, 11 (01): : 45 - 60
  • [26] Binary image encryption technique and decryption system using Joint Transform Correlator
    Park, SJ
    Seo, DH
    Kim, JY
    Bae, JK
    Kim, CS
    Kim, SJ
    PHOTONIC AND QUANTUM TECHNOLOGIES FOR AEROSPACE APPLICATIONS III, 2001, 4386 : 164 - 171
  • [27] Fpga Implementation Of Image Encryption And Decryption Using AES 128-Bit
    Priyanka, M. P.
    Prasad, E. Lakshmi
    Reddy, A. R.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 156 - 160
  • [28] Hardware Design of Image Encryption and Decryption Using CORDIC Based Chaotic Generator
    Paliwal, Atharv
    Mohindroo, Bhavik
    Suneja, Kriti
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (IEEE - ICRAIE-2020), 2020,
  • [29] A New Image Encryption and Decryption Technique using Genetic Algorithm and Residual Numbers
    Agbedemnab, Peter Awon-natemi
    Baagyere, Edward Yellakuor
    Daabo, Mohammed Ibrahim
    2019 IEEE AFRICON, 2019,
  • [30] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629