Bi-level Fragmented Scrambling for Image Secrecy

سال انتشار: 1386
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 2,259

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

این مقاله در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ISCC04_049

تاریخ نمایه سازی: 10 اسفند 1385

چکیده مقاله:

Image position scrambling is the pre-processing stage in image cryptography and image steganography. Arnold’s cat map is one of the most commonly used methods in pixel location scrambling. Since the method is performed on the all pixels of the whole image one by one, it takes time so much that limits its application. By the way, due to the image dimensions are obvious; the image can be recovered simply at most with T (period) iterations, so it needs an extra stage of encryption. This paper has tried to reduce the pixel location scrambling time and to increase its secrecy and security. In this paper a new method is proposed which apply Arnold’s transformation in two different levels. So it is called Bi-level Fragmented Scrambler, BFS. BFS fragments the image to a predefined number in each level. These predefined values can be considered as a key for the image scrambler. The method is simulated to find the computation time and a scrambling degree, to compare BFS in different conditions (i.e. for different image size and number of fragments) and with the previous method. Simulation results show that BFS can increase security in the scrambling step (so no extra encryption stage will be needed), while reduces the process time effectively.

نویسندگان

Fatemeh Forati

Electrical Engineering Department, Iran University of Science & Technology, Tehran, Iran

Hadi Shahriar Shahhoseini

Electrical Engineering Department, Iran University of Science & Technology, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • B. Schneier, "Applied Cryptography _ Protocols, Algorithms, and Source Code ...
  • National Institute of Standards and Technology (US), *Specification for the ...
  • S. Li, G. Chen, and X. Zheng, «Chaos-based encryption for ...
  • S. Li, G. Chen, A. Cheung, and B. Bhargava, _ ...
  • B. Goldburg, S. Sridharan, and E. Dawson, «Design and cryptanalysis ...
  • K.L. Chung and L.C. Chang, *Large encrypting binary images with ...
  • W. Zeng and S. Lei, ،Efficient frequency domain selective scrambling ...
  • H.C.H. Cheng, ،Partia1 encryption for image and video communica tion, ...
  • _ Uehara and R. Safavi-Naini, «Chosen DCT coefficients attack on ...
  • R Ni., Q.Q. Ruan and H.D. Cheng, ،secure semi- blind ...
  • نمایش کامل مراجع