Encryption of Color Images using Pixel Shift Algorithm and Developed Hill Algorithm

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 189

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_TDMA-11-4_001

تاریخ نمایه سازی: 11 اسفند 1401

Abstract:

With the advent of communication networks, the speed of data transmission has increased dramatically. One of the important factors in each transfer is to maintain data security and prevent unauthorized access to data transmitted. Using cryptography is one of the methods used to keep data secure throughout the transmission path. Today, with the growth of computer networks, the use of video conferencing, the transfer of military information, image data, the need for encryption of data in a variety of image data plays an important role. Encryption in images due to its specific features, such as the high volume of transmitted images, the amount of additional data for encryption, the correlation coefficient and the high repetition among the pixels, are very different from the text data; this has led to all traditional encryption methods It is not suitable for image data and there are changes in their structure to use traditional methods in image cryptography. In this paper, using pixel shift algorithms and Hill's encryption algorithm, ciphering of color images has been addressed; the pixel shift algorithm has been used to maintain greater dependency and security, and Hill's encryption algorithm has been used to change the amount of pixels. For analysis of the work, the algorithm is presented and for comparison with other methods, images and standard analysis methods have been used. The obtained results improve the efficiency of the proposed algorithm in comparison with the standard hail algorithm (especially in images with similar pixels) And compared with other comparable algorithms.

Authors

mohsen Norouzi

Researcher, Faculty of Computer, Imam Hossein University, Tehran, Iran

Ali Arshaghi

Researcher, Faculty of Computer, Imam Hossein University, Tehran, Iran

Moshsen Ashourian

Department of Electrical Engineering, Majlesi Branch, Islamic Azad University, Isfahan, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Roger A. Prichard, “History of Encryption” January ۲۶, ۲۰۰۲ ...
  • Andreas Uhl, Andreas Pommer, “image and video encryption”,SpringerScience, p.۱, ۲۰۰۵ ...
  • S. Faragallah, Utilization of Security Techniques for Multimedia Applications, Ph. ...
  • J. Menezes, P. C. V. Oorschot and S. Vanstone, “Handbook ...
  • Qiao, “Multimedia Security and CopyrightP Urbana-Champaign, Urbana, Illinois”, USA, ۱۹۹۸ ...
  • ISMAIL A, AMIN Mohammed, DIAB Hossam, “How to repair the ...
  • K.Muttoo, Deepika Aggarwal, Bhavya Ahuja, “A Secure Image Encryption Algorithm ...
  • Yang Liu, Xiaojun Tong, Shicheng Hu, ”A family of new ...
  • نمایش کامل مراجع