Saturday, August 10, 2019

Image Encryption Reserach Paper Research Example | Topics and Well Written Essays - 1250 words

Image Encryption Reserach - Research Paper Example This paper is a summary of the encryption algorithms and their classification that is based on their means. We analyze the mathematical based, DNA encryption as well as the Chaos based. The objectives and future achievements that are in place are also discussed. Introduction In our current world, very important information is always transmitted to various places via the internet. For some reason, this information may sometimes be accessed by people who should not access the information at all e.g. internet hackers. It is for this reason that most organizations prefer to use image hiding to protect the crucial information that they move in the network. Image encryption is the cryptographic process that involves the transformation of plaintext information, using the cipher algorithm so that it is made unreadable to anyone apart from the people who have the professional special knowledge about the encryption usually called the key. As a result ciphertext is made this is encrypted inform ation. In order to make the encrypted message readable again, a process known as decryption is done to the encrypted information (Cimato 56). During the process of image encryption, three main processes are involved. This include; pixel scrambling, this is very simple and in most cases easy to achieve. However its security is compromising. This is because in this process, only the positions of the pixels are changed but not the positions of the pixel gray. The second process is pixel replacement. In this type Boolean operation XOR is used to alter the values of the gray. However if plain attacks come, then the process is not effective. The combination of the pixel replacement and the pixel scrambling is the third process. This is the most effective way to encrypt information. Advantages of image encryption Image encryption is one of the most affordable and important defense mechanisms available to many small businesses. Below are some of its advantages in the application of data sec urity. 1. In case a hacker gets past all other measures of security, a well, encrypted information automatically stops them from getting past this security measure. It is therefore a good security measure. 2. Another importance of encryption is that incase a laptop of an employee working with a lot of information is stolen, the laptop will not be able to work outside that organization due to the encrypted information hence protecting the information. 3. Image encryption is very cheap and efficient compared to other data protection techniques. This is the reason why many businesses prefer to use image encryption. 4. It is also used for the verification and authentication of the image (Tina ET all 78). Section 2 Image encryption techniques Mathematical concept-based image encryption techniques In this type of technique, concepts of mathematics are used to build and design the encryption algorithms. There are three types that are involved; non linear matrix mixing sometimes known as th e Arnold transformation, this type mixes pixels according to color space and phase space. It uses the cipher that is derived from cease. The second one is the use of space curves e.g. H curve, E curves and so on. This type uses the principle of non omitted and non repetitive to reach the desired goals (Pommer 112). Recorded pixels are the last one. This type uses the methods of trigonometric transformations, and logarithmic transformations. Secret segment

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.