scalable encryption
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 0)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
Lorenzo De Carli ◽  
Ruben Torres ◽  
Gaspar Modelo-Howard ◽  
Alok Tongaonkar ◽  
Somesh Jha
Keyword(s):  

2016 ◽  
Vol 26 (11) ◽  
pp. 1650191 ◽  
Author(s):  
Yushu Zhang ◽  
Jiantao Zhou ◽  
Fei Chen ◽  
Leo Yu Zhang ◽  
Di Xiao ◽  
...  

The existing Block Compressive Sensing (BCS) based image ciphers adopted the same sampling rate for all the blocks, which may lead to the desirable result that after subsampling, significant blocks lose some more-useful information while insignificant blocks still retain some less-useful information. Motivated by this observation, we propose a scalable encryption framework (SEF) based on BCS together with a Sobel Edge Detector and Cascade Chaotic Maps. Our work is firstly dedicated to the design of two new fusion techniques, chaos-based structurally random matrices and chaos-based random convolution and subsampling. The basic idea is to divide an image into some blocks with an equal size and then diagnose their respective significance with the help of the Sobel Edge Detector. For significant block encryption, chaos-based structurally random matrix is applied to significant blocks whereas chaos-based random convolution and subsampling are responsible for the remaining insignificant ones. In comparison with the BCS based image ciphers, the SEF takes lightweight subsampling and severe sensitivity encryption for the significant blocks and severe subsampling and lightweight robustness encryption for the insignificant ones in parallel, thus better protecting significant image regions.


2014 ◽  
Vol 8 (4) ◽  
pp. 62-102 ◽  
Author(s):  
Piotr Książak ◽  
William Farrelly ◽  
Kevin Curran

The number of Resource-Limited Wireless Devices utilized in many areas of IT is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography. Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power and memory. These demands cannot be met by the majority of ubiquitous computing devices, thus there is a need to apply lightweight cryptography primitives and lightweight authentication protocols that meet these demands in any application of security to devices with limited resources. A security framework is presented here that combines aspects of the Gossamer protocol and the Scalable Encryption Algorithm (SEA) to provide an implementation of inter-device security. The Gossamer Protocol is additionally used as a means of exchanging session keys for use with the SEA encryption protocol. Our system performed well with the code space requirements smaller than 600 bytes (excluding shared libraries) and a performance of 27 milliseconds per one 96-bit block of data.


2011 ◽  
Vol 64 (3) ◽  
pp. 1075-1091 ◽  
Author(s):  
Guojun Wang ◽  
Qiushuang Du ◽  
Wei Zhou ◽  
Qin Liu

2011 ◽  
Vol 23 (4) ◽  
pp. 1-5
Author(s):  
K.J. Jegadish Kumar ◽  
K.Chenna Kesava ◽  
S. Salivahanan

Sign in / Sign up

Export Citation Format

Share Document