Image Encryption and Decryption Schemes Using Linear and Quadratic Fractal Algorithms and Their Systems

被引:0
|
作者
Kovalchuk, Anatoliy [1 ]
Izonin, Ivan [1 ]
Strauss, Christine [2 ]
Podavalkina, Mariia [1 ]
Lotoshynska, Natalia [1 ]
Kustra, Nataliya [1 ]
机构
[1] Lviv Polytech Natl Univ, Dept Publishing Informat Technol, Lvov, Ukraine
[2] Univ Vienna, Dept Elect Business, Vienna, Austria
关键词
encryption; decryption; fractal algorithm; contour; image; linear fractal; quadratic fractal; fractal algorithms system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image protection and organizing the associated processes is based on the assumption that an image is a stochastic signal. This results in the transition of the classic encryption methods into the image perspective. However the image is some specific signal that, in addition to the typical informativeness (informative data), also involves visual informativeness. The visual informativeness implies additional and new challenges for the issue of protection. As it involves the highly sophisticated modern image processing techniques, this informativeness enables unauthorized access. In fact, the organization of the attack on an encrypted image is possible in two ways: through the traditional hacking of encryption methods or through the methods of visual image processing (filtering methods, contour separation, etc.). Although the methods mentioned above do not fully reproduce the encrypted image, they can provide an opportunity to obtain some information from the image. In this regard, the encryption methods, when used in images, have another task - the complete noise of the encrypted image. This is required to avoid the use of visual imaging techniques. The paper describes the use of RSA algorithm elements in fractal quadratic transformations and fractal transform systems for encrypting / decrypting grayscale images. The values of pixel intensities in the matrix of such images are known to be in the range from 0 to 255. Noise functions in both methods were linear.
引用
收藏
页码:139 / 150
页数:12
相关论文
共 50 条
  • [41] Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform
    Sharma, Prerana
    Mishra, Devesh
    Agarwal, Ankur
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 153 - 157
  • [42] Image Encryption and Decryption Using Combined Key Sequence of Logistic map and Lozi map
    Rohith, S.
    Sujatha, B. K.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1053 - 1058
  • [43] Image Steganography Using LSB and Hybrid Encryption Algorithms
    Alanzy, May
    Alomrani, Razan
    Alqarni, Bashayer
    Almutairi, Saad
    APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [44] Image Encryption and Decryption using Chaotic Key Sequence Generated by Sequence of Logistic Map and Sequence of States of Linear Feedback Shift Register
    Rohith, S.
    Bhat, K. N. Hari
    Sharma, A. Nandini
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2014,
  • [45] Advanced genetic image encryption algorithms for intelligent transport systems
    Souici, Ismahane
    Mahamdioua, Meriama
    Jacques, Sébastien
    Ouahabi, Abdeldjalil
    Computers and Electrical Engineering, 2025, 123
  • [46] Image Encryption Schemes Based on a Class of Uniformly Distributed Chaotic Systems
    Zang, Hongyan
    Tai, Mengdan
    Wei, Xinyuan
    MATHEMATICS, 2022, 10 (07)
  • [47] Two layer Encryption Schemes for Symmetric algorithms using DNA Sequences
    Vantigaru, Siddaramappa
    Basavaraj, Ramesh Krishnarajanagar
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2019, 14 (04): : 953 - 964
  • [48] HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme
    Latha, Heggere Rangaswamaiah
    Ramaprasath, Alagarswamy
    JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)
  • [49] Image compression and encryption scheme using fractal dictionary and Julia set
    Sun, Yuanyuan
    Xu, Rudan
    Chen, Lina
    Hu, Xiaopeng
    IET IMAGE PROCESSING, 2015, 9 (03) : 173 - 183
  • [50] Enhanced Secure Image Steganography using Double Encryption Algorithms
    Manjula, Y.
    Shivakumar, K. B.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 705 - 708