In this paper, a new simple and fast algorithm for image encryption is proposed. It exploits the scan patterns and function XOR in three standalone steps. The decryption procedure is similar to that of the encryption but in the reversed order. We implement and test the proposed algorithm using different sample image inputs and our experimental result and security analysis indicates the robustness and advantages of the new proposed algorithm. Using this algorithm it is possible to reproduce the original image with no loss of information for the encryption and decryption process. Algorithm is fast and simple enough to be comparable to other recent approaches, and it has passed all the security requirements and it is fast and secure to be used...
At the present time, the increase of data transmission over various networks in a wide range, which ...
AbstractTransferring medical images using networks is subjected to a wide variety of security risks....
image is either color or a grayscale image). A binary image is introduced as a “keyimage ” with the ...
Internet plays an important role in circulating a huge amount of multimedia. An example of this mult...
This paper presents two methods for encryption and decryption of images using XOR operation. In the ...
This paper presents a simple but secure novel reversible scheme for hiding a whole encrypted image i...
In this document, we propose a simple algorithm for the encryption of gray-scale images, although th...
In this document, we propose a simple algorithm for the encryption of gray-scale images, although th...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
In recent years, the need to develop encryption algorithms has led to an increase in the working and...
In this study, we propose an innovative image encryption Techniques based on four different image en...
Content protection is considered as an important issue in today’s world. Therefore, encryption of su...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
New method of secure image encryption and decryption scheme based on the chaos is proposed. There ar...
In the digital era, most types of transmitted data over the Internet are images. These ima...
At the present time, the increase of data transmission over various networks in a wide range, which ...
AbstractTransferring medical images using networks is subjected to a wide variety of security risks....
image is either color or a grayscale image). A binary image is introduced as a “keyimage ” with the ...
Internet plays an important role in circulating a huge amount of multimedia. An example of this mult...
This paper presents two methods for encryption and decryption of images using XOR operation. In the ...
This paper presents a simple but secure novel reversible scheme for hiding a whole encrypted image i...
In this document, we propose a simple algorithm for the encryption of gray-scale images, although th...
In this document, we propose a simple algorithm for the encryption of gray-scale images, although th...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
In recent years, the need to develop encryption algorithms has led to an increase in the working and...
In this study, we propose an innovative image encryption Techniques based on four different image en...
Content protection is considered as an important issue in today’s world. Therefore, encryption of su...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
New method of secure image encryption and decryption scheme based on the chaos is proposed. There ar...
In the digital era, most types of transmitted data over the Internet are images. These ima...
At the present time, the increase of data transmission over various networks in a wide range, which ...
AbstractTransferring medical images using networks is subjected to a wide variety of security risks....
image is either color or a grayscale image). A binary image is introduced as a “keyimage ” with the ...