57 research outputs found

    Applications of cellular automata in digital watermarking processes

    Get PDF
    Los grandes avances de la tecnología hoy en día han ayudado a la comunicación y distribución de todo tipo de material digital de manera instantánea. Este es uno de los grandes beneficios de las tecnologías de la información y comunicación, donde también existen diversas amenazas de infracciones relacionadas al derecho de autor o Copyright, falsificaciones de contenido, plagios, por mencionar algunas. Al pasar de los años se han desarrollado diferentes algoritmos computacionales para coadyuvar a la protección de datos en archivos de textos, audio y video, respectivamente. En este artículo se presenta un análisis del estado del arte sobre el uso de autómatas celulares dentro del campo de procesamiento de imágenes digitales en conjunto con la técnica de Marcado de Agua Digital (Digital Watermarking).The great advances in technology today have helped the communication and distribution of all kinds of digital material information instantly. This is one of the great benefits of information and communication technologies, where there are also various threats of infringements, violations related to copyright, falsification of content, and plagiarism, to name a few, etc. Over the years, different computational algorithms and methods have been developed to help protect data in texts, audios and videos files, respectively. In this article, an analysis of the state of the art on the use of cellular automata within the field of digital image processing is presented in conjunction with the technique of, such as the use Digital Watermark algorithm  etc

    A novel symmetric image cryptosystem resistant to noise perturbation based on S8 elliptic curve S-boxes and chaotic maps

    Get PDF
    The recent decade has seen a tremendous escalation of multimedia and its applications. These modern applications demand diverse security requirements and innovative security platforms. In this manuscript, we proposed an algorithm for image encryption applications. The core structure of this algorithm relies on confusion and diffusion operations. The confusion is mainly done through the application of the elliptic curve and S8 symmetric group. The proposed work incorporates three distinct chaotic maps. A detailed investigation is presented to analyze the behavior of chaos for secure communication. The chaotic sequences are then accordingly applied to the proposed algorithm. The modular approach followed in the design framework and integration of chaotic maps into the system makes the algorithm viable for a variety of image encryption applications. The resiliency of the algorithm can further be enhanced by increasing the number of rounds and S-boxes deployed. The statistical findings and simulation results imply that the algorithm is resistant to various attacks. Moreover, the algorithm satisfies all major performance and quality metrics. The encryption scheme can also resist channel noise as well as noise-induced by a malicious user. The decryption is successfully done for noisy data with minor distortions. The overall results determine that the proposed algorithm contains good cryptographic properties and low computational complexity makes it viable to low profile applications

    A fast ARX model-based image encryption scheme

    Get PDF
    corecore