selective encryption of images using differential evolution

طريقة اقتباس المقال الحالي:
Writer، "selective encryption of images using differential evolution،" في مؤسسة المجلة العربية للعلوم ونشر الأبحاث، تم الاسترداد بتاريخ (12/04/2022)، من (https://blog.ajsrp.com/?p=30315).
selective encryption of images using differential evolution

selective encryption of images using differential evolution

 

تأليف: ibrahim solyman i. abuhaiba(مشرف):: nadeen rawhi mahmoud salem deeb(اعداد)
اللغة: إنجليزي
النشر: gaza strip:author 2011
المكان:
النوع: رسائل جامعية
عدد الصفحات: 89
المواضيع: cryptography – computer science:: data encryption – access control (computers systems):: التحكم في البيانات:: التشفير:: الشفرة (حاسبات الكترونية ):: الشيفرات:: تكنولوجيا المعلومات – تحكم:: سرية البيانات
رقم التصنيف: 005.82
الرقم العام:

العنوان : selective encryption of images using differential evolution

selective encryption of images using differential evolution
selective encryption of images using differential evolution

 

ABSTRACT

 

The security of multimedia data in digital distribution networks is commonly provided by encryption, i.e., the mathematical process that transforms a plaintext message into unintelligible ciphertext. Nevertheless, the classical and modern ciphers have all been developed for the simplest form of multimedia data, i.e., text, and are not appropriate for higher forms such as images and video with very large file sizes.

Selective encryption is a recent approach to reduce the computational requirements for huge volumes of multimedia data in distribution networks with different client device capabilities. In this research, we provide a new scheme of selective encryption of images based on Differential Evolution operations (crossover and mutation).

In this research, image data are encrypted efficiently in the frequency domain by employing selective crossover of DCT coefficients of the same frequency bands between selective segments. Correlation of the segment is used as a fitness function of the crossover to determine the selective segments.

The mutation function modifies the sign bit of certain DCT coefficients restricted to a specific number of blocks and segments determined by the user needs. Finally, Scaling DC coefficient is done to diffuse statistics.
Cryptographically, secure pseudo-random number generator whose seed values are the sub-keys generated from a 80- bits secret key is used to control the entire encryption process.
Thorough experimental tests are carried out with detailed analysis demonstrating considerable levels of security and different levels of visual degradation to target different applications requirements.

In additions, our new approach has very limited adverse impact on the compression efficiency and it allows scalability, and some other content processing functionalities without having to access the cryptographic key and to perform decryption, since it achieves format compliance.
These advantages make it suitable for image transmission over network.

Key words: Selective Encryption, Differential Evolution, Crossover, Mutation, DCT Coefficients, Visual Degradation, Compression Efficiency, Format Compliance.

 

 

Loader Loading...
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

تحميل

 

طالع أيضا 

 

selective encryption of images using differential evolution
selective encryption of images using differential evolution

المصدر

القائمة البريدية

اشترك في القائمة البريدية لتعرف كل جديد
الاسم الكريم