N. Prasad, Vasudharini Moranam Ravi, Lakshmi Chandrasekhar
{"title":"使用加密QR的图像加密,随机相位编码和逻辑映射","authors":"N. Prasad, Vasudharini Moranam Ravi, Lakshmi Chandrasekhar","doi":"10.1109/ICCCI.2018.8441219","DOIUrl":null,"url":null,"abstract":"This paper presents an image encryption technique with three layers of security. The aim is to increase the degree of randomness in the image through data and location shuffling. This is implemented through a logistic map, symmetric key cryptography, and generation of Quick Response (QR) codes. Finally, the corresponding image metrics such as entropy, correlation, differential and error metric analyses were performed and results were listed out.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Image Encryption with an Encrypted QR, Random Phase Encoding, and Logistic Map\",\"authors\":\"N. Prasad, Vasudharini Moranam Ravi, Lakshmi Chandrasekhar\",\"doi\":\"10.1109/ICCCI.2018.8441219\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an image encryption technique with three layers of security. The aim is to increase the degree of randomness in the image through data and location shuffling. This is implemented through a logistic map, symmetric key cryptography, and generation of Quick Response (QR) codes. Finally, the corresponding image metrics such as entropy, correlation, differential and error metric analyses were performed and results were listed out.\",\"PeriodicalId\":141663,\"journal\":{\"name\":\"2018 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI.2018.8441219\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI.2018.8441219","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image Encryption with an Encrypted QR, Random Phase Encoding, and Logistic Map
This paper presents an image encryption technique with three layers of security. The aim is to increase the degree of randomness in the image through data and location shuffling. This is implemented through a logistic map, symmetric key cryptography, and generation of Quick Response (QR) codes. Finally, the corresponding image metrics such as entropy, correlation, differential and error metric analyses were performed and results were listed out.