R. Bhagyashri Pandurangi, Meenakshi. R. Patil, Anuradha M Pujari
{"title":"A Color image encryption technique using reality preserving fractional DCT","authors":"R. Bhagyashri Pandurangi, Meenakshi. R. Patil, Anuradha M Pujari","doi":"10.1109/I2CT.2017.8226245","DOIUrl":null,"url":null,"abstract":"This paper proposes an encryption of color snapshot making use of reality-preserving fractional discrete cosine transform (RPFrDCT). Color picture encryption scheme proposed is headquartered on RPFrDCT and pertaining to space and disordered mapping. The authentic-valued output, the nonlinear manipulation, the excessive sensitiveness and immoderate robustness to the cipher keys are the main advantages of this scheme. From the experimental outputs we can show that the proposed encryption scheme is feasible and mighty. In this paper we show the effective and improved results for various parameters like PSNR, correlation, histogram, UACI and entropy etc.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International Conference for Convergence in Technology (I2CT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2CT.2017.8226245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper proposes an encryption of color snapshot making use of reality-preserving fractional discrete cosine transform (RPFrDCT). Color picture encryption scheme proposed is headquartered on RPFrDCT and pertaining to space and disordered mapping. The authentic-valued output, the nonlinear manipulation, the excessive sensitiveness and immoderate robustness to the cipher keys are the main advantages of this scheme. From the experimental outputs we can show that the proposed encryption scheme is feasible and mighty. In this paper we show the effective and improved results for various parameters like PSNR, correlation, histogram, UACI and entropy etc.