This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of watermarked images and new chaotic generators. Logistic-May (LM), May-Gaussian (MG), and Gaussian-Gompertz (GG) were used as chaotic generators for their good properties in order to correct the flaws of 1D chaotic maps (Logistic, May, Gaussian, Gompertz) when used individually. Firstly, the discrete cosine transformation (DCT) and the low-pass filter of appropriate sizes are used to combine the target watermarked images in the spectral domain in two different multiplex images. Secondly, each of the two images is concatenated into blocks of small size, which are mixed by changing their position following the order generated by a chaotic sequence from ...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
In order to protect valuable data from undesirable readers or against illegal reproduction and modif...
The advent of wireless communications, both inside and outside the home-office environment has led t...
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, ...
International audienceWe report a new spectral multiple image fusion analysis based on the discrete ...
Abstract- Digital image scrambling is to transform a digital image, to make it unrecognizable and be...
Abstract: This article introduces a novel image encryption algorithm based on DNA addition combining...
This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one...
The process of encoding any given piece of information or data using a particular selection of avail...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
International audienceWe introduce a double optimization procedure for spectrally multiplexing multi...
The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA ...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
In order to protect valuable data from undesirable readers or against illegal reproduction and modif...
The advent of wireless communications, both inside and outside the home-office environment has led t...
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, ...
International audienceWe report a new spectral multiple image fusion analysis based on the discrete ...
Abstract- Digital image scrambling is to transform a digital image, to make it unrecognizable and be...
Abstract: This article introduces a novel image encryption algorithm based on DNA addition combining...
This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one...
The process of encoding any given piece of information or data using a particular selection of avail...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
International audienceWe introduce a double optimization procedure for spectrally multiplexing multi...
The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA ...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
In order to protect valuable data from undesirable readers or against illegal reproduction and modif...
The advent of wireless communications, both inside and outside the home-office environment has led t...