{"title":"Encryption in High Dynamic Range Images for RGBE Format","authors":"Jing-Ya Yan, Tzungher Chen, Chih-Hung Lin","doi":"10.1109/IIH-MSP.2013.128","DOIUrl":null,"url":null,"abstract":"This paper presents a new encryption scheme of high dynamic range (HDR) images. HDR images are more and more popular and network bandwidth is large enough to transmit large data, therefore, HDR images need to be properly protected, such as encryption. Here we use a new tool to achieve the purpose of encryption. The features of elementary cellular automata (ECA) that make us choose it as an encryption tool. ECA allows this encryption scheme be implemented easily and executed efficiently. The experimental results prove this encryption scheme sufficient security and doesn't need expensive computing resources.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"59 9","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2013.128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper presents a new encryption scheme of high dynamic range (HDR) images. HDR images are more and more popular and network bandwidth is large enough to transmit large data, therefore, HDR images need to be properly protected, such as encryption. Here we use a new tool to achieve the purpose of encryption. The features of elementary cellular automata (ECA) that make us choose it as an encryption tool. ECA allows this encryption scheme be implemented easily and executed efficiently. The experimental results prove this encryption scheme sufficient security and doesn't need expensive computing resources.