0% Complete
صفحه اصلی
/
سی امین کنفرانس بین المللی مهندسی برق
Partial Image Encryption of Faces Based on Chaotic Maps and Elliptic Curve Cryptography
نویسندگان :
Ali Soleymani
1
Md Jan Nordin
2
1- موسسه آموزش عالی الکترونیکی ایرانیان
2- Universiti Kebangsaan Malaysia
کلمات کلیدی :
Image, Encryption, Decryption, Selective, Chaotic, Elliptic Curve Cryptography
چکیده :
The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as medical information, official correspondence or governmental and military documents saved and transmitted in the form of images over public networks. Cryptography is a solution to protect confidential images by encrypting before transmission over unsecure channels. This paper will focus on selective image encryption algorithm to improve and enhance the security of transmission. Selective encryption is a solution to decrease the consumed time for encryption, which reduces the encrypted regions as small as possible. Hence, a hybrid cryptosystem is proposed based on the combination of ECC and chaotic maps that detects the face(s) in an image and encrypt the selected regions. This scheme will encrypt around five percent of the whole. The results of security analysis demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.
لیست مقالات
لیست مقالات بایگانی شده
Posture Stabilization of Tractor-Trailer Wheeled Mobile Robot Using Nonlinear MPC
Kevin Babakhanloo - Khalil Alipour - Bahram Tarvirdizadeh - Majid Sorouri - Mohammad Ghamari
طراحی کنترل آموزش پذیر تکرار شونده مقاوم برای سیستم خط نورد فلزات با رویکرد سیستمهای دو بعدی
علی ردانی پور - مسعود شفیعی
Formation of Singular Multi-Agent Systems via a New Iterative Learning Control Approach
Ali Raddanipour - Masoud Shafiee
Design and Simulation of a Novel High Sensitive MEMS Microphone Based On a Spring-Supported Circular Diaphragm
Mehdi Pazhooh - Ebrahim Abbaspour-Sani
تخمین پارامتر سریهای زمانی دو بعدی چند متغیره گسسته
مرضیه بهمنی - محسن شفیعیراد - مهدی زینالی - احسان ناظمالرعایا
Secure Control System Using Iterative Secret Sharing
Younes Esmaeili - Mohammad Haeri - Saeed Adelipour
Type-2 Fuzzy Wavelet Control for a Quadruple-Tank System based on Disturbance Rejection
Mohammadreza Esmaeilidehkordi - Alireza Nezamzadeh - Maryam Zekri - Iman Izadi - Farid Sheikholeslam
T-type L-2L De-Embedding Method for On-Wafer T-model Transmission Line Network
Milad Seyedi - Nasser Masoumi - Samad Sheikhaei
یک روش اقتصادی برای تعیین مکان بهینه ریکلوزرها در فیدرهای توزیع شعاعی با هدف بهبود قابلیت اطمینان
محمودرضا شاکرمی - میثم دوستی زاده - هومن بسطامی - مهران امیری - ابراهیم شریفی پور - شمس الدین کمالوند
Multi-agent H-Learning Based Cooperative Spectrum Sensing for Cognitive Radio Networks
Elaheh Karimpour Fard - Mahdi Nouri - Hamid Behroozi - Sima Sobhi-Givi
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 41.7.4