3,489 research outputs found

    A Novel Latin Square Image Cipher

    Full text link
    In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square Whitening, Latin Square S-box and Latin Square P-box ; 2) we provide a new way of integrating probabilistic encryption in image encryption by embedding random noise in the least significant image bit-plane; and 3) we construct LSIC with these Latin square image encryption primitives all on one keyed Latin square in a new loom-like substitution-permutation network. Consequently, the proposed LSIC achieve many desired properties of a secure cipher including a large key space, high key sensitivities, uniformly distributed ciphertext, excellent confusion and diffusion properties, semantically secure, and robustness against channel noise. Theoretical analysis show that the LSIC has good resistance to many attack models including brute-force attacks, ciphertext-only attacks, known-plaintext attacks and chosen-plaintext attacks. Experimental analysis under extensive simulation results using the complete USC-SIPI Miscellaneous image dataset demonstrate that LSIC outperforms or reach state of the art suggested by many peer algorithms. All these analysis and results demonstrate that the LSIC is very suitable for digital image encryption. Finally, we open source the LSIC MATLAB code under webpage https://sites.google.com/site/tuftsyuewu/source-code.Comment: 26 pages, 17 figures, and 7 table

    Study of Reversible Scheme for Data Hiding

    Get PDF
    Web is the prominent correspondence media now a days yet message exchange over the web is confronting a few issue, for example, copyright control, information security, information, confirmation and so forth. Information stowing away assumes a critical part in information security. It is a procedure in which mystery information or data is put away or covered up into cover media. Thus many explores are advancing on the field like web security, steganography, and cryptography. At the point when exchange the safe or private information over a shaky channel it is expected to encode cover or unique information and after that insert the protected information into that unique or, on the other hand cover picture

    Development of Visual Cryptography Technique for Authentication Using Facial Images

    Get PDF
    Security in the real world is an important issue to be taken care and to be encountered with various aspects and preventive measures. In the present era, whole major security concerns is the protection of this multimedia web is coming closer from text data to multimedia data, one of the data. Image, which covers the highest percentage of the multimedia data, its protection is very important. These might include Military Secrets, Commercial Secrets and Information of individuals. This can be achieved by visual Cryptography. It is one kind of image encryption. Incurrent technology, most of visual cryptography areembedded a secret using multiple shares. Visual is secret sharing technique used in visual cryptography which divides the secret image into multiple shares and by superimposing those shares the original secret image is going to be revealed, but it create a threat when an intruder get shares with which the image is going to be decrypted easily. However in these project work, an extremely useful bitwise operation is perform on every pixel with the help of key. The key is provided by new concept of sterilization algorithm. Initially Red, Green and Blue channels get separated from image and are going to be encrypted on multiple levels using multiple shares, convert an image into unreadable format and by combining all the shares in proper sequence the original secret image revealed

    Near-optimal pitch of a moiré grating for image hiding applications in dynamic visual cryptography

    Get PDF
    Dynamic visual cryptography is based on hiding of a dichotomous secret image in the regular moiré grating. One pitch of the moiré grating is used to represent the secret image and a slightly different pitch of another moiré grating is used to form the background. The secret is decoded in the form of a pattern of a time-averaged moiré fringe when the cover image is oscillated according to a predefined law of motion. The security of the encoding and the sharpness of the decoded secret are mostly influenced by the selection of the pitches of moiré grating. This paper proposes scheme for the determination of near-optimal pitches of the moiré grating for image hiding in dynamic visual cryptography
    • …
    corecore