期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Image Encryption and Decryption Based on Chaotic Algorithm
1
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm image encryption and decryption Two-Stage Logistic Mapping M Sequence
下载PDF
Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm
2
作者 Aninda Majumder Mohammad Raihan Ruhin +1 位作者 Tahsina Hashem Md. Imdadul Islam 《Journal of Computer and Communications》 2016年第2期1-10,共10页
In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end nod... In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and remote service center. In such link, the communication is heavily affected by large and small scale fading;hence the received signal experiences huge distortion in case of forward error correction. Otherwise, huge service delay arises due to frequent negative acknowledgements. To combat the situation, we can choose Alamouti channel of full rate and fully orthogonal space-time block code (OSTBC). Our aim is to transmit images through Alamouti channel and to observe the quality of the recovered image, in context of bit error rate (BER). We have also observed the impact of fading and additive white Gaussian noise (AWGN) on the image without application of error correction or detection technique of channel coding. To ensure security, we apply the RSA algorithm on each pixel prior transmitting and decrypt them at the receiving end, where we found no impairment from the algorithm. Finally, we observe that the relative performance of the system changes digital modulation schemes. 展开更多
关键词 Quotient and Remainder Matrix Alamouti Simulator Multiple-Input Single-Output (MISO) image encryption and decryption BER and Discrete Wavelet Transform (DWT)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部