K. Swetha, Sai Saaketh Sharma K, A Sai Niteesh, O Sai Sumith, K. Madhuri
{"title":"不同图像加密技术的研究","authors":"K. Swetha, Sai Saaketh Sharma K, A Sai Niteesh, O Sai Sumith, K. Madhuri","doi":"10.1109/I-SMAC47947.2019.9032635","DOIUrl":null,"url":null,"abstract":"Image Encryption is one of the most underrated encryption types available, about which no exposure was given. While Steganography is hiding plain text in an image, image encryption is encrypting the image itself with help of pixels present. Image encryption can be done in many ways like image to base64, image to binary (basic levels) but the real encryption is done using public and private keys. Few of the Encryption techniques like “Chaotic Map Sequence”, “Image Encryption using Matlab”, “Image Encryption using Python” involve the use of keys like public and private. Photo authentication methods are attempting to transform the unique picture to a picture that is hard to retrieve. Security is a significant issue in the correspondence and handling of pictures with the ever growing multimedia applications. Various methods are utilized in every now and then to scramble pictures so as to make them more secure. In this paper, image encryption based on python and a low-complexity cryptographic algorithm known as Secure Force with Affine Transformation was suggested along with “Chaotic Map Sequence” for future references. The encryption segment can be executed by utilizing straightforward design by comprising just of fundamental numerical tasks (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This can decrease the weight on the encoder, as the more confounded key extension technique is just performed on the decoder. The plan of this paper is to play out the proposed calculation's security investigation and execution assessment. Results of the proposed algorithm was checked on different types of images and comparative analysis was provided with other techniques.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Study of Distnict Image Encryption Techniques\",\"authors\":\"K. Swetha, Sai Saaketh Sharma K, A Sai Niteesh, O Sai Sumith, K. Madhuri\",\"doi\":\"10.1109/I-SMAC47947.2019.9032635\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Image Encryption is one of the most underrated encryption types available, about which no exposure was given. While Steganography is hiding plain text in an image, image encryption is encrypting the image itself with help of pixels present. Image encryption can be done in many ways like image to base64, image to binary (basic levels) but the real encryption is done using public and private keys. Few of the Encryption techniques like “Chaotic Map Sequence”, “Image Encryption using Matlab”, “Image Encryption using Python” involve the use of keys like public and private. Photo authentication methods are attempting to transform the unique picture to a picture that is hard to retrieve. Security is a significant issue in the correspondence and handling of pictures with the ever growing multimedia applications. Various methods are utilized in every now and then to scramble pictures so as to make them more secure. In this paper, image encryption based on python and a low-complexity cryptographic algorithm known as Secure Force with Affine Transformation was suggested along with “Chaotic Map Sequence” for future references. The encryption segment can be executed by utilizing straightforward design by comprising just of fundamental numerical tasks (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This can decrease the weight on the encoder, as the more confounded key extension technique is just performed on the decoder. The plan of this paper is to play out the proposed calculation's security investigation and execution assessment. Results of the proposed algorithm was checked on different types of images and comparative analysis was provided with other techniques.\",\"PeriodicalId\":275791,\"journal\":{\"name\":\"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SMAC47947.2019.9032635\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC47947.2019.9032635","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image Encryption is one of the most underrated encryption types available, about which no exposure was given. While Steganography is hiding plain text in an image, image encryption is encrypting the image itself with help of pixels present. Image encryption can be done in many ways like image to base64, image to binary (basic levels) but the real encryption is done using public and private keys. Few of the Encryption techniques like “Chaotic Map Sequence”, “Image Encryption using Matlab”, “Image Encryption using Python” involve the use of keys like public and private. Photo authentication methods are attempting to transform the unique picture to a picture that is hard to retrieve. Security is a significant issue in the correspondence and handling of pictures with the ever growing multimedia applications. Various methods are utilized in every now and then to scramble pictures so as to make them more secure. In this paper, image encryption based on python and a low-complexity cryptographic algorithm known as Secure Force with Affine Transformation was suggested along with “Chaotic Map Sequence” for future references. The encryption segment can be executed by utilizing straightforward design by comprising just of fundamental numerical tasks (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This can decrease the weight on the encoder, as the more confounded key extension technique is just performed on the decoder. The plan of this paper is to play out the proposed calculation's security investigation and execution assessment. Results of the proposed algorithm was checked on different types of images and comparative analysis was provided with other techniques.