R. S. Mohammed, Fadhil Hanoon Abbood, Intisar Abid Yousif
{"title":"基于聚类和随机标准映射的图像加密技术","authors":"R. S. Mohammed, Fadhil Hanoon Abbood, Intisar Abid Yousif","doi":"10.1109/AIC-MITCSA.2016.7759931","DOIUrl":null,"url":null,"abstract":"In recent years, encryption technology has been developed quickly and many image encryption methods have been put forward. This paper presents a technique of image encryption based on image clustering as preprocessing. Permutation and substitution processes are done by using a series of secret keys that generated by proposed stochastic standard map. Image decryption is done using the reverse operations of image encryption and using adding process rather than clustering to recover an image. Experimental results verify and prove that the proposed technique is secure and fast.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Image encryption technique using clustering and stochastic standard map\",\"authors\":\"R. S. Mohammed, Fadhil Hanoon Abbood, Intisar Abid Yousif\",\"doi\":\"10.1109/AIC-MITCSA.2016.7759931\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, encryption technology has been developed quickly and many image encryption methods have been put forward. This paper presents a technique of image encryption based on image clustering as preprocessing. Permutation and substitution processes are done by using a series of secret keys that generated by proposed stochastic standard map. Image decryption is done using the reverse operations of image encryption and using adding process rather than clustering to recover an image. Experimental results verify and prove that the proposed technique is secure and fast.\",\"PeriodicalId\":315179,\"journal\":{\"name\":\"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AIC-MITCSA.2016.7759931\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AIC-MITCSA.2016.7759931","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image encryption technique using clustering and stochastic standard map
In recent years, encryption technology has been developed quickly and many image encryption methods have been put forward. This paper presents a technique of image encryption based on image clustering as preprocessing. Permutation and substitution processes are done by using a series of secret keys that generated by proposed stochastic standard map. Image decryption is done using the reverse operations of image encryption and using adding process rather than clustering to recover an image. Experimental results verify and prove that the proposed technique is secure and fast.