Digits Reverse Order Based Approach for Symmetric Encryption/Decryption of Digital Images

2020 ◽  
Author(s):  
Arvind Singh Choudhary ◽  
Manoj Kumar ◽  
Sudhir Keshari
2020 ◽  
Vol 44 (35) ◽  
pp. 15251-15259 ◽  
Author(s):  
Pritam Ghosh ◽  
Suparna Paul ◽  
Debanjan Dey ◽  
Saibal Jana ◽  
Biswajit Gopal Roy ◽  
...  

A small molecular probe was synthesized and its response towards biologically significant ions Zn2+ and F− with low detection threshold (Zn2+: 50 nM & F−: 3 μM) was investigated as well as Bio-molecular device designing was performed.


2014 ◽  
Vol 41 (1) ◽  
pp. 26-31
Author(s):  
Hala Abdul Wahab ◽  
Sura Sarab

Many digital services require reliable security in storage and transmission of digital images. Due to the rapid growth of theinternet in the digital world today, the security of digital images has become more important and attracted much attention. The prevalenceof multimedia technology in our society has promoted digital images to play a more significant role than the traditional texts, whichdemand serious protection of users' privacy for all applications. Encryption techniques of digital images are very important and should beused to frustrate unauthorized access from opponents. In this paper a new approach is proposed for partial encryption in digital imagebased on dragging the longest wavelength color in digital image then input the extract color to the plasma encoding algorithm to havepartial ciphered image that can be deciphered at the recipient side using the proposed retrieve algorithm. It is possible to apply multilevelfor the proposed approach to increase the security level with less time for encryption/decryption. The new approach test appeared that theencryption/decryption processes was very flexible and efficient.


2017 ◽  
Vol 6 (1) ◽  
Author(s):  
Abdelkader Moumen ◽  
Hocine Sissaoui

AbstractVulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.


Author(s):  
Göran Pulkkis ◽  
Kaj J. Grahn

Quantum cryptography will have a severe impact on information security technology. The objective of this article is to present state-of-the-art and future possibilities of two quantum cryptography protocol types. These protocols are for absolutely secure distribution of symmetric encryption/ decryption keys and for creating secure digital signatures.


Author(s):  
Jamil Al-Azzeh ◽  
Ziad Alqadi ◽  
Qazem Jaber

 The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.In this paper we will introduce a new method of digital image encryption-decryption, which will be very simple, highly secure and accurate and highly efficient.


1998 ◽  
Vol 27 (2) ◽  
pp. 93-96 ◽  
Author(s):  
C H Versteeg ◽  
G C H Sanderink ◽  
S R Lobach ◽  
P F van der Stelt

1999 ◽  
Vol 28 (2) ◽  
pp. 123-126 ◽  
Author(s):  
E Gotfredsen ◽  
J Kragskov ◽  
A Wenzel
Keyword(s):  

Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


2020 ◽  
Vol 6 (4) ◽  
pp. 183-210
Author(s):  
Erin Nunoda

This article examines YouTube videos (primarily distributed by a user named Cecil Robert) that document so-called dead malls: unpopulated, unproductive, but not necessarily demolished consumerist sites that have proliferated in the wake of the 2008 recession. These works link digital images of mall interiors with pop-song remixes so as to re-create the experience of hearing a track while standing within the empty space; manipulating the songs’ audio frequencies heightens echo effects and fosters an impression of ghostly dislocation. This article argues that these videos locate a potentiality in abandoned mall spaces for the exploration of queer (non)relations. It suggests that the videos’ emphasis on lonely, unconsummated intimacies questions circuitous visions of the public sphere, participatory dynamics online, and the presumably conservative biopolitics (both at its height and in its memorialization) of mall architecture.


Sign in / Sign up

Export Citation Format

Share Document