[PDF][PDF] A novel encryption method for image security

MAF Al-Husainy - International Journal of Security and Its …, 2012 - academia.edu
Image encryption is one of the most methods of information hiding. A novel secure
encryption method for image hiding is presented in this paper. The proposed method …

MAC address as a key for data encryption

DMAF Al-Husainy - arxiv preprint arxiv:1311.3821, 2013 - arxiv.org
In computer networking, the Media Access Control (MAC) address is a unique value
associated with a network adapter. MAC addresses are also known as hardware addresses …

Security analysis of a three‐dimensional rotation‐based image encryption

B Nini, C Lemmouchi - IET Image Processing, 2015 - Wiley Online Library
This study presents an analysis of the basis of a new method presented recently in the
image encryption domain. The method might use different schemes of bits projection where …

[PDF][PDF] Genetic Algorithm: Tool to Encrypt Image.

F Al-Husainy, M Abbas - International Journal of Advanced …, 2012 - researchgate.net
Security is an important issue when digital images are transmitted through the internet and
cellular phones, as well as being important in encryption of the satellite images, and image …

[PDF][PDF] Bit-projection based color image encryption using a virtual rotated view

B Nini - Informatica, 2013 - informatica.si
It becomes commonly known that any important data exchange, mainly through a network,
should be subject to a previous encryption in order to avoid its misuse. The particular case of …

[PDF][PDF] A Novel Gray Image Encryption Algorithm Based on Modified Transcendental Equation.

L Tu, Y Wang, N Li, S Guo - J. Softw., 2013 - jsoftware.us
In this paper a modified transcendental equation is proposed, and we analyzed its chaotic
characteristics and periodic. It is a simple non-linear mode, l but it has complex dynam ics …

[PDF][PDF] A Survey on Security of Permutation for only Image Encryption Schemes

N Aparna, M Kavyashree - scholar.archive.org
The improved technology has provided a facility for multimedia transmission (like images,
data, videos) over the open internet network but there are more chances of insecurity in this …

Proposed Technique for Encryption JPG and BMP Images

AM Kadhim, HM Jawad - IOP Conference Series: Materials …, 2020 - iopscience.iop.org
The technique of chaotic system is considered one of the applications for high security
encryption, where a color images sent is encrypted for the purpose of preserving from …

[PDF][PDF] Exchanging Encrypted Documents Through Fax Machines

ELZ Mohamed, E Othman - Journal of the ACS, 2011 - asc.journals.ekb.eg
Even in this age of the Internet, the fax machine has remained an indispensable means of
communication because of its speed, simplicity and reliability. Faxes are also virtually …

[CITATION][C] 基于多重混沌系统的图像加密隐藏传输

龙海珠 - **电子商务, 2012