• 제목/요약/키워드: Image Encryption

검색결과 303건 처리시간 0.026초

영상데이터의 안전한 전송을 위한 부분 영상 암호화 시스템 설계 (Partial image encryption system design for secure transmission of images)

  • 박시찬
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.132-134
    • /
    • 2004
  • This paper proposes partial image encryption system for secure transmission of images. Partial image encryption is suitable for real-time processing purpose of multimedia data that needs compression and encryption. Compression part uses modified SPIHT algorithm and encryption part uses AES. Partial image encryption is significant reduction in encryption time in comparison with whole image encryption.

  • PDF

쿼드트리 분할 기술을 이용한 컬러 영상 암호화 기술 (Color Image Encryption Technique Using Quad-tree Decomposition Method)

  • 최현준
    • 한국항행학회논문지
    • /
    • 제20권6호
    • /
    • pp.625-630
    • /
    • 2016
  • 최근 다양한 형태의 영상 콘텐츠가 제작되고 있고, 이를 위한 저작권 보호기술에 대한 관심이 높아지고 있다. 본 논문에서는 컬러 영상을 위한 영상암호화 기술을 제안한다. 이 기술은 영상을 RGB 색차성분으로 분할한 후, 윤곽선을 기준으로 쿼드트리 분할을 수행한다. 쿼드트리 분할 후, 선정된 블록들을 대상으로 암호화를 수행한다. 색차성분을 대상으로 암호화를 수행하여 암호화 효율을 측정하고, 컬러 영상으로 재구성한 후에도 암호화 효율을 측정한다. 암호화 효율은 시각적인 측정방식과 객관적인 화질평가 방식을 이용한다. 실험결과 PSNR 수치는 색차성분의 경우 7~10[dB], 컬러 영상의 경우 16~19[dB]로 측정되었다. 본 논문에서 제안한 영상암호화 기술은 향후 다양한 디지털 영상 콘텐츠의 저작권 보호에 사용될 것으로 보인다.

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator

  • Panduranga, H.T.;Naveen, Kumar S.K.;Sharath, Kumar H.S.
    • Journal of Information Processing Systems
    • /
    • 제9권3호
    • /
    • pp.499-510
    • /
    • 2013
  • Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to generate an encrypted image. Then, the XOR operation is applied between the encrypted image and the second input image to encrypt the second image. This process is continues until the nth input image is encrypted. We achieved hardware co-simulation of the proposed multiple image encryption technique by using the Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. We validated our proposed technique by using the hardware software co-simulation method.

가상 위상 영상을 이용한 광학적 암호화 시스템 (Optical encryption system using phase-encoded virtual image)

  • 서동환;신창목;김수중;배장근;김철수;도양회
    • 한국광학회지
    • /
    • 제14권3호
    • /
    • pp.249-254
    • /
    • 2003
  • 본 논문에서는 위상 변조된 가상 영상과 간섭의 원리를 이용하여 영상의 암호화 및 복호화 수준을 향상시키는 방법을 제안하였다. 원 영상은 그레이 값을 가지는 가상 영상과 무작위 암호화 키, 그리고 복호화 키를 위상 변조하여 이들을 간섭계의 한 쪽 경로에 둠으로써 기준파와의 간섭에 의해서 간단히 복원될 수 있다. 제안한 암호화 과정은 원 영상의 어떤 정보도 포함하지 않은 위상 변조된 가상영상과 컴퓨터를 통해서 만들어진 무작위 영상(암호화 키)을 곱함으로써 암호화한다. 그러므로 허가되지 않은 사람들이 암호화키를 분석함으로써 있을 수 있는 복제 가능성을 배제하였다. 또한 그레이 영상을 암호화함으로써 이진 위상 암호화방법에 비해 암호화 수준이 높은 장점을 가진다. 컴퓨터 시뮬레이션과 광 실험을 통하여 제안한 방법이 광 암호화 시스템에 적합함을 확인하였다.

Research on Equal-resolution Image Hiding Encryption Based on Image Steganography and Computational Ghost Imaging

  • Leihong Zhang;Yiqiang Zhang;Runchu Xu;Yangjun Li;Dawei Zhang
    • Current Optics and Photonics
    • /
    • 제8권3호
    • /
    • pp.270-281
    • /
    • 2024
  • Information-hiding technology is introduced into an optical ghost imaging encryption scheme, which can greatly improve the security of the encryption scheme. However, in the current mainstream research on camouflage ghost imaging encryption, information hiding techniques such as digital watermarking can only hide 1/4 resolution information of a cover image, and most secret images are simple binary images. In this paper, we propose an equal-resolution image-hiding encryption scheme based on deep learning and computational ghost imaging. With the equal-resolution image steganography network based on deep learning (ERIS-Net), we can realize the hiding and extraction of equal-resolution natural images and increase the amount of encrypted information from 25% to 100% when transmitting the same size of secret data. To the best of our knowledge, this paper combines image steganography based on deep learning with optical ghost imaging encryption method for the first time. With deep learning experiments and simulation, the feasibility, security, robustness, and high encryption capacity of this scheme are verified, and a new idea for optical ghost imaging encryption is proposed.

Improvement of the Multiple Image Encryption Capacity Using QR Code as a Data Container

  • Bai, Xing;Hu, Jianping;Yuan, Sheng;Wang, Jinchao;Wang, Jing;Zhou, Xin
    • Current Optics and Photonics
    • /
    • 제4권4호
    • /
    • pp.302-309
    • /
    • 2020
  • An image encryption scheme based on the quick response (QR) code as a data container has aroused wide interest due to the lossless recovery of the decrypted image. In this paper, we apply this method to multi-image encryption. However, since the decrypted image is affected by crosstalk noise, the number of multi-image encryptions is severely limited. To solve this problem, we analyzed the performance of QR code as a data container, and processed the decrypted QR code using the proposed method, so that the number of multi-image encryptions is effectively increased. Finally, we implemented a large image (256 × 256) encryption and decryption.

홀로그래픽 영상 암호화 및 디코딩 기법 (Holographic image encryption and decoding scheme)

  • 양훈기;정대섭;김은수
    • 전자공학회논문지A
    • /
    • 제33A권12호
    • /
    • pp.97-103
    • /
    • 1996
  • This paper presents a new security verification technique based on an image encryption by a white noise image that serves as an encryption key. In the proposed method that resembles holographic process, the encryption process is executed digitally using FFT routine which gives chances for separating corruptive noise from reconstructed primary image The encoded image thus obtained is regarded as an nterference pattern caused by two lightwaves transmitted through the primary image and the white noise image. The decoding process is executed optically and in real-tiem fashion where lightwave transmitted through the white noise image illuminates the encrypted card.

  • PDF

광 암호화를 이용한 안전한 지문 인식 시스템 (Secure Fingerprint Identification System based on Optical Encryption)

  • 한종욱;김춘수;박광호;김은수
    • 한국통신학회논문지
    • /
    • 제24권12B호
    • /
    • pp.2415-2423
    • /
    • 1999
  • We propose a new optical method which conceals the data of authorized persons by encryption before they are stored or compared in the pattern recognition system for security systems. This proposed security system is made up of two subsystems : a proposed optical encryption system and a pattern recognition system based on the JTC which has been shown to perform well. In this system, each image of authorized persons as a reference image is stored in memory units through the proposed encryption system. And if a fingerprint image is placed in the input plane of this security system for access to a restricted area, the image is encoded by the encryption system then compared with the encrypted reference image. Therefore because the captured input image and the reference data are encrypted, it is difficult to decrypt the image if one does not know the encryption key bit stream. The basic idea is that the input image is encrypted by performing optical XOR operations with the key bit stream that is generated by digital encryption algorithms. The optical XOR operations between the key bit stream and the input image are performed by the polarization encoding method using the polarization characteristics of LCDs. The results of XOR operations which are detected by a CCD camera should be used as an input to the JTC for comparison with a data base. We have verified the idea proposed here with computer simulations and the simulation results were also shown.

  • PDF

1차원 비선형 그룹 셀룰라 오토마타 기반의 영상 암호 (Image Encryption Based on One Dimensional Nonlinear Group Cellular Automata)

  • 최언숙;조성진;김태홍
    • 한국멀티미디어학회논문지
    • /
    • 제18권12호
    • /
    • pp.1462-1467
    • /
    • 2015
  • Pixel values of original image can be changed by XORing pixel values of original image and pixel values of the basis image obtained by pseudo random sequences. This is a simple method for image encryption. This method is an effect method for easy hardware implementation and image encryption with high speed. In this paper we propose a method to obtain basis image with pseudo random sequences with large nonlinearity using nonlinear cellular automata and maximum length linear cellular automata. And experimental results showed that the proposed image encryption scheme has large key space and low correlation of adjacent cipher pixel values.

The fast image encryption algorithm based on substitution and diffusion

  • Zhang, Yong;Jia, Xiaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4487-4511
    • /
    • 2018
  • A fast image encryption system based on substitution and diffusion was proposed, which includes one covering process, one substitution process and two diffusion processes. At first, Chen's chaotic system together with an external 256-bit long secret key was used to generate the key streams for image encryption, in which the initial values of Chen's chaotic system were regarded as the public key. Then the plain image was masked by the covering process. After that the resulting image was substituted with the disturbed S-Box of AES. Finally, the substituted image was diffused twice with the add-modulo operations as the core to obtain the cipher image. Simulation analysis and comparison results with AES and some existing image cryptosystems show that the proposed image cryptosystem possesses the merits of fast encryption/decryption speed, good statistical characteristics, strong sensitivity and etc., and can be used as a candidate system of network security communication.