The growing use of networking in almost every possible field, data transferring or data sharing has become an essential need. All kinds of users directly or indirectly involved in data transfer. But data transferring ...
详细信息
ISBN:
(纸本)9781728148274
The growing use of networking in almost every possible field, data transferring or data sharing has become an essential need. All kinds of users directly or indirectly involved in data transfer. But data transferring is susceptible to various risks i.e. hacking of potential data, tempering, etc. Various services based on data sharing or transferring across the network needs security and reliability of the system. Most of the stakeholders may not be fully aware about the fact that their communication is unsecure. Users are relying upon the system they are using and assume that their ongoing communication is secure. Generally, data categorized into text and image messages. There are many works on securing of text message through encryption has been achieved in last decades. But securing images are differs in many ways from that because text. Nowadays, securing image is necessary and quite in demand. In this paper, we have proposed an image encryption algorithm to secure image while being transmitted in two layers.
Cloud computing is one of the fastest growing internet based technology that facilitates users to utilize services by making use of large poll of resources without installation of any software. Adoption of this techno...
详细信息
Cloud computing is one of the fastest growing internet based technology that facilitates users to utilize services by making use of large poll of resources without installation of any software. Adoption of this technology is increasing rapidly because of many advantages including reduction of cost and IT load. Despite the popularity of cloud computing, it faces many difficulties such as security that is one of the major inhibitors in the growth of cloud computing. Data confidentiality is at the top of the list of security concern for this technology. Many methods have been introduced to overcome this issue;encryption is one of them and widely used method to ensure the data confidentiality in cloud environment. In this study, an attempt is made to review the encryption techniques used for the data confidentiality. The results of review are classified on the basis of type of approach and the type of validation used to validate the approach.
This paper proposes a method for double image encryption based on a proposed random fractional transform. Firstly, we produce a pseudorandom sequence to randomize the eigenvalue of the discrete fractional Fourier tran...
详细信息
This paper proposes a method for double image encryption based on a proposed random fractional transform. Firstly, we produce a pseudorandom sequence to randomize the eigenvalue of the discrete fractional Fourier transform based on logistic map. Secondly, a random matrix is produced based on two-dimension logistic map. Then, the eigenvector of the proposed random matrix is used to replace the eigenvector of the discrete fractional Fourier transform. At the last, we present a double image encryption algorithm based on the proposed random fractional transform. Numerical simulations have been performed to verify the efficiency of the proposed algorithm.
This paper presents a new image encryption algorithm, that accepts an initial secret key and an initialization vector, to produce the encryption/decryption keys using a modified pseudo-random generator. This key is us...
详细信息
ISBN:
(数字)9781728141428
ISBN:
(纸本)9781728141435
This paper presents a new image encryption algorithm, that accepts an initial secret key and an initialization vector, to produce the encryption/decryption keys using a modified pseudo-random generator. This key is used to encrypt the input images using an XOR cipher. The mathematical inability of the attacker to determine the values of the seeds, due to their logical discreteness from the output of the pseudorandom generator, and thus the encryption algorithm, is the key feature that ensures the security of the algorithm. The proposed algorithm is used to encrypt the standard test images, and the obtained results are scrutinized with respect to the following metrics - histogram, correlation, entropy, NPCR, and UACI. Theoretical and experimental analyses are performed to justify the performance and security offered by the proposed algorithm.
The article examines the influence of the initial image parameters on the result of its encryption for different encryption algorithms and modes of their use. Graphic files of the *.ppm format is used as research obje...
详细信息
Wireless sensor networks (WSNs) technology is one of the most important technologies of the Internet of things. It is effectively applied within several applications in the actual world, including health care, environ...
详细信息
ISBN:
(数字)9781728138411
ISBN:
(纸本)9781728138428
Wireless sensor networks (WSNs) technology is one of the most important technologies of the Internet of things. It is effectively applied within several applications in the actual world, including health care, environmental monitoring, tracking, etc. WSNs consist of small sensor nodes having limited resources. The communication between the components of WSNs is unsecured though. Therefore, in order to secure the exchanged data, it is crucial to implement efficient and lightweight cryptographic schemes. In this paper, we evaluate the performance of different cryptosystems for WSNs. Our paper includes a comparison study between the studied encryption algorithms in terms of power consumption, required space memory, and computational time.
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via th...
详细信息
ISBN:
(纸本)9781479923427
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via the left-side type of quaternion Fourier transforms. The new transform is applied to color image encryption for validation, where the rotation angles are used as encryption keys making it more secure compared to a recent method using discrete quaternion Fourier transforms (DQFTs). Experimental results show that the proposed encryption algorithm for color image performs as well as the DQFTs method in terms of noise robustness, so that it could be a useful tool for color image encryption.
It explores data security algorithms pertinent to public decision-making support systems using blockchain technology in solving core issues of the public decision-making process, such data security, openness, and effi...
详细信息
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic ...
详细信息
ISBN:
(纸本)9781424458561
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic sequences and wavelet transform. This algorithm controls the initial parameters of two onedimensional chaotic sequences through keys, generates the chaotic sequence, diffuses the image, and then does wavelet decomposition to the diffused image, finally, scrambles the image using two-dimensional hyper-chaotic sequences. The experimental results show that this algorithm has a good encryption effect and a high security.
Gentry introduced the first plausible fully homomorphic encryption (FHE) scheme, which was considered a major breakthrough in cryptography. Several FHE schemes have been proposed to make FHE more efficient for practic...
详细信息
ISBN:
(纸本)9781479934331
Gentry introduced the first plausible fully homomorphic encryption (FHE) scheme, which was considered a major breakthrough in cryptography. Several FHE schemes have been proposed to make FHE more efficient for practical applications since then. The leveled fully homomorphic scheme is among the most well-known schemes. In leveled FHE scheme, large-number matrix-vector multiplication is a crucial part of the encryption algorithm. In this paper, Chinese Remainder Theorem (CRT) is employed to reduce the computational complexity of the large-number element-by-element modular multiplication. The first step is called decomposition, in which each large-number element in the matrix and vector is decomposed into many small words. The next step is vector operation that performs the modular multiplications and additions of the decomposed small words. Finally the matrix-vector multiplication results can be obtained through reconstruction. We compare the CRT-based method with Number Theory Library (NTL), showing the proposed method is about 7.8 times faster when executing on CPU. In addition, it is observed that vector operation takes up to 99.6% of the total computation time and the reconstruction only takes 0.4%. Therefore GPU acceleration is employed to speed up the vector operations. Experiment results show that the GPU implementation of the CRT-based method is 35.2 times faster than the same method implemented on CPU and is 273.6 times faster than the NTL library on CPU.
暂无评论