Encryption of Color Images using Pixel Shift Algorithm and Developed Hill Algorithm

سال انتشار: 1401
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 192

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_TDMA-11-4_001

تاریخ نمایه سازی: 11 اسفند 1401

چکیده مقاله:

With the advent of communication networks, the speed of data transmission has increased dramatically. One of the important factors in each transfer is to maintain data security and prevent unauthorized access to data transmitted. Using cryptography is one of the methods used to keep data secure throughout the transmission path. Today, with the growth of computer networks, the use of video conferencing, the transfer of military information, image data, the need for encryption of data in a variety of image data plays an important role. Encryption in images due to its specific features, such as the high volume of transmitted images, the amount of additional data for encryption, the correlation coefficient and the high repetition among the pixels, are very different from the text data; this has led to all traditional encryption methods It is not suitable for image data and there are changes in their structure to use traditional methods in image cryptography. In this paper, using pixel shift algorithms and Hill's encryption algorithm, ciphering of color images has been addressed; the pixel shift algorithm has been used to maintain greater dependency and security, and Hill's encryption algorithm has been used to change the amount of pixels. For analysis of the work, the algorithm is presented and for comparison with other methods, images and standard analysis methods have been used. The obtained results improve the efficiency of the proposed algorithm in comparison with the standard hail algorithm (especially in images with similar pixels) And compared with other comparable algorithms.

نویسندگان

mohsen Norouzi

Researcher, Faculty of Computer, Imam Hossein University, Tehran, Iran

Ali Arshaghi

Researcher, Faculty of Computer, Imam Hossein University, Tehran, Iran

Moshsen Ashourian

Department of Electrical Engineering, Majlesi Branch, Islamic Azad University, Isfahan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Roger A. Prichard, “History of Encryption” January ۲۶, ۲۰۰۲ ...
  • Andreas Uhl, Andreas Pommer, “image and video encryption”,SpringerScience, p.۱, ۲۰۰۵ ...
  • S. Faragallah, Utilization of Security Techniques for Multimedia Applications, Ph. ...
  • J. Menezes, P. C. V. Oorschot and S. Vanstone, “Handbook ...
  • Qiao, “Multimedia Security and CopyrightP Urbana-Champaign, Urbana, Illinois”, USA, ۱۹۹۸ ...
  • ISMAIL A, AMIN Mohammed, DIAB Hossam, “How to repair the ...
  • K.Muttoo, Deepika Aggarwal, Bhavya Ahuja, “A Secure Image Encryption Algorithm ...
  • Yang Liu, Xiaojun Tong, Shicheng Hu, ”A family of new ...
  • نمایش کامل مراجع