Friday, June 14, 2019
Image Encryption Reserach Paper Research Example | Topics and Well Written Essays - 1250 words
range Encryption Reserach - Research Paper ExampleThis paper is a summary of the encryption algorithms and their salmagundi that is based on their means. We analyze the mathematical based, DNA encryption as well as the Chaos based. The objectives and future achievements that argon in place are also discussed. Introduction In our current world, very important information is always transmitted to various places via the internet. For some reason, this information may sometimes be accessed by people who should non access the information at all e.g. internet hackers. It is for this reason that virtually organizations prefer to use image hiding to nourish the crucial information that they move in the network. Image encryption is the cryptographic process that involves the transformation of plaintext information, using the cipher algorithm so that it is made indeciphercapable to anyone apart from the people who have the professional special knowledge about the encryption usually call ed the key. As a result ciphertext is made this is encrypted information. In nine to make the encrypted message readable again, a process known as decryption is done to the encrypted information (Cimato 56). During the process of image encryption, terce main processes are involved. This include pixel scrambling, this is very simple and in most cases easy to achieve. However its hostage is compromising. This is because in this process, only the positions of the pixels are changed but not the positions of the pixel gray. The randomness process is pixel replacement. In this fictional character Boolean operation XOR is used to alter the values of the gray. However if plain attacks come, then the process is not effective. The combination of the pixel replacement and the pixel scrambling is the third process. This is the most effective way to encrypt information. Advantages of image encryption Image encryption is one of the most affordable and important defense mechanisms available to many small businesses. Below are some of its advantages in the application of data security. 1. In case a hacker gets past all other measures of security, a well, encrypted information automatically stops them from getting past this security measure. It is therefore a good security measure. 2. Another importance of encryption is that incase a laptop of an employee working with a lot of information is stolen, the laptop will not be able to work outside that organization due to the encrypted information hence protecting the information. 3. Image encryption is very cheap and efficient compared to other data aegis techniques. This is the reason why many businesses prefer to use image encryption. 4. It is also used for the verification and authentication of the image (Tina ET all 78). Section 2 Image encryption techniques Mathematical concept-based image encryption techniques In this type of technique, concepts of mathematics are used to build and design the encryption algorithms. Th ere are three types that are involved non linear matrix mixing sometimes known as the Arnold transformation, this type mixes pixels according to color space and phase space. It uses the cipher that is derived from cease. The second one is the use of space curves e.g. H curve, E curves and so on. This type uses the principle of non omitted and non repetitive to reach the desired goals (Pommer 112). Recorded pixels are the last one. This type uses the methods of trigonometric transformations, and logarithmic transformations. Secret segment
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment