期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Partially Deep-Learning Encryption Technique
1
作者 Hamdy M.Mousa 《Computers, Materials & Continua》 SCIE EI 2023年第2期4277-4291,共15页
The biggest problem facing the world is information security in the digital era.Information protection and integrity are hot topics at all times,so many techniques have been introduced to transmit and store data secur... The biggest problem facing the world is information security in the digital era.Information protection and integrity are hot topics at all times,so many techniques have been introduced to transmit and store data securely.The increase in computing power is increasing the number of security breaches and attacks at a higher rate than before on average.Thus,a number of existing security systems are at risk of hacking.This paper proposes an encryption technique called Partial Deep-Learning Encryption Technique(PD-LET)to achieve data security.PD-LET includes several stages for encoding and decoding digital data.Data preprocessing,convolution layer of standard deep learning algorithm,zigzag transformation,image partitioning,and encryption key are the main stages of PD-LET.Initially,the proposed technique converts digital data into the corresponding matrix and then applies encryption stages to it.The implementation of encrypting stages is frequently changed.This collaboration between deep learning and zigzag transformation techniques provides the best output result and transfers the original data into a completely undefined image which makes the proposed technique efficient and secure via data encryption.Moreover,its implementation phases are continuously changed during the encryption phase,which makes the data encryption technique more immune to some future attacks because breaking this technique needs to know all the information about the encryption technique.The security analysis of the obtained results shows that it is computationally impractical to break the proposed technique due to the large size and diversity of keys and PD-LET has achieved a reliable security system. 展开更多
关键词 encryption technique deep learning SECURITY zigzag transformation image partitioning
在线阅读 下载PDF
Chaos-Based Novel Watermarked Satellite Image Encryption Scheme
2
作者 Mohamed Medani Yahia Said +4 位作者 Nashwan Adnan Othman Farrukh Yuldashev Mohamed Kchaou Faisal Khaled Aldawood Bacha Rehman 《Computer Modeling in Engineering & Sciences》 2025年第4期1049-1070,共22页
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted be... Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted before communication.Therefore,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash algorithm.The watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,respectively.Through bitwise XOR and substitution,the TD-ERCS map encrypts the watermark image.The ciphered watermark image is embedded in the plaintext image.The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map.The permuted image is then bitwise XORed with the values obtained from the Duffing map.For additional security,the XORed image is substituted through a dynamic S-Box.To evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks. 展开更多
关键词 DNA sequence TD-ERCS chaoticmap henon chaoticmap duffing chaotic system SHA-512 encryption technique watermark embedding
在线阅读 下载PDF
A new distribution scheme of decryption keys used in optical verification system with multiple-wavelength information 被引量:2
3
作者 牛春晖 张岩 顾本源 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第10期1996-2003,共8页
A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images ... A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images corresponding to three wavelengths are encoded into three sets of phase-only masks (POMs) by a special distributing method. These three sets of POMs are assigned to three authorized users as the personal identification. A lensless optical system is used as the verification system. In the verification procedure, every two of the three authorized users can pass the verification procedure cooperatively, but only one user cannot do. Numerical simulation shows that the proposed distribution scheme of decryption keys not only can improve the security level of verification system, but also can bring convenience and flexibility for authorized users. 展开更多
关键词 optical encryption technique multiple-wavelength information diffractive optical system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部