• Aucun résultat trouvé

chaos-based image encryption

Robust Chaos-based Stream-Cipher for Secure Public Communication Channels

Robust Chaos-based Stream-Cipher for Secure Public Communication Channels

... efficient image encryption schemes has become a focal research ...of chaos in cryptography, a large number of chaos-based image encryption schemes has been ...on ...

5

Novel Models of Image Permutation and Diffusion Based on Perturbed Digital Chaos

Novel Models of Image Permutation and Diffusion Based on Perturbed Digital Chaos

... digital chaos-based ...fast chaos-based image encryption scheme with a dynamic state variables selection ...color image encryption with heterogeneous ...

54

Fast and secure chaos-based cryptosystem for images

Fast and secure chaos-based cryptosystem for images

... fast chaos-based image encryption scheme using a dynamic state variables selection ...the encryption structure is sim- ilar to the structure of Zhang [ Zhang et ...color image ...

22

Chaos-based cryptosystems using dependent diffusion: An overview

Chaos-based cryptosystems using dependent diffusion: An overview

... Keywords: chaos-based cryptosystems; dependent confusion-diffusion; speed performance; security ...many chaos-based image encryption schemes have been ...is based on ...

7

Digital double random amplitude image encryption method based on the symmetry property of the parametric discrete Fourier transform

Digital double random amplitude image encryption method based on the symmetry property of the parametric discrete Fourier transform

... real-to-real image encryption method based on the parametric DFT reported in ...amplitude encryption technique coupled with a chaotic ...for encryption and ensure that the resulting ...

10

Variational Exemplar-Based Image Colorization

Variational Exemplar-Based Image Colorization

... Exemplar-based Image Colorization Aur´elie Bugeau, Vinh-Thong Ta, and Nicolas Papadakis Abstract—In this paper, we address the problem of recovering a color image from a grayscale ...source ...

10

Image Encryption based on Optical Coherence Multiplexing Technique

Image Encryption based on Optical Coherence Multiplexing Technique

... Optical image encryption has received a great deal of attention ...are based on double-random phase encoding ...method based on Stokes- Mueller formalism ...for image encryption, ...

4

Local regularity-based image denoising

Local regularity-based image denoising

... by image seg- mentation based on textural information: Suppose we wish to dif- ferentiate highly textured zones (appearing for instance in MR or radar imaging) in a noisy ...original image is, say, ...

6

Universal behaviour of a wave chaos based electromagnetic reverberation chamber

Universal behaviour of a wave chaos based electromagnetic reverberation chamber

... Wave chaos has been a very active field of research for decades, concerned with the spectral and spatial asymptotic properties of wave systems whose ray counterpart is chaotic [13, 14, ...

13

Cryptography-Based Chaos via Geometric Undersampling of Ring-Coupled Attractors

Cryptography-Based Chaos via Geometric Undersampling of Ring-Coupled Attractors

... thresholds based on one component of the coupled system adds random properties to the chaotic ...undersampling based on the property of piecewise linearity of the invariant measure of the system of p ...

28

Image interpolation for image-based control under large displacement

Image interpolation for image-based control under large displacement

... the image-space is a promising ...reference image features using an affine approximation are proposed to enlarge the stable ...the image space is de- scribed and applied to planar mobile robot with a ...

9

Enhanced Software Implementation of a Chaos-Based Stream Cipher

Enhanced Software Implementation of a Chaos-Based Stream Cipher

... Stream ciphers are commonly used to encrypt data in real time applications like, for example, in selective video encryption [1][2]. It consists in performing an eXclusive OR (XOR) operation between a plain text ...

7

Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory

Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory

... Attribute-Based Encryption Abstract: Due to the widespread of cloud computing, there is an increasing interest in distributed systems as well as in data privacy and ...Attribute-Based ...

7

Web-Based Configurable Image Annotations

Web-Based Configurable Image Annotations

... relevant image annotation Web ...the image. It can also be used as a seed in region- growing image segmentation ...the image, and is used in object detection ...

5

Image Variance Based Random Illumination Microscopy

Image Variance Based Random Illumination Microscopy

... M. Allain, and A. Sentenac, “Structured illumination microscopy using unknown speckle patterns”, Nature Photonics, vol. 6, no. 5, pp. 312– 315, 2012. [5] S. Labouesse, A. Negash, J. Idier, S. Bourguignon, T. Mangeat, P. ...

4

Multiband Image Fusion Based on Spectral Unmixing

Multiband Image Fusion Based on Spectral Unmixing

... multiband image with a spatial resolution comparable to those of MS and panchromatic (PAN) images (which are acquired in much fewer bands) ...multiband image from multiple and complementary observed images, ...

15

Towards ultrasound image-based visual servoing

Towards ultrasound image-based visual servoing

... Index Terms— Visual servoing, ultrasound images, medical robotics. I. I NTRODUCTION Nowadays, the ultrasound imaging is extensively used in medicine. This widespread use is due to the non invasive aspect and the low cost ...

7

Linear Generalized ElGamal Encryption Scheme

Linear Generalized ElGamal Encryption Scheme

... homomorphic encryption, Linear Assumption, ElGamal encryption ...key encryption scheme has been designed in the ...homomorphic encryption and one of the first IND-CPA probabilistic public key ...

12

Image moments-based ultrasound visual servoing

Image moments-based ultrasound visual servoing

... The authors are with IRISA, INRIA Rennes-Bretagne Atlantique, Cam- pus de Beaulieu, 35 042 Rennes-cedex, France { Rafik.Mebarki, Alexandre.Krupa, Francois.Chaumette } @irisa.fr designed for per-cutaneous ...

8

Mixing Compression and CA Encryption

Mixing Compression and CA Encryption

... classical encryption after compression methods used in classical security ...is based on a LZ compression algorithm in which a Vernam cipher has been ...

13

Show all 10000 documents...

Sujets connexes