Improving Organizations Security Using Visual Cryptography Based on XOR and Chaotic-Based Key

Maryam Tahmasbi, R. Boostani, Mohammad Aljaidi, Hani Attar
{"title":"Improving Organizations Security Using Visual Cryptography Based on XOR and Chaotic-Based Key","authors":"Maryam Tahmasbi, R. Boostani, Mohammad Aljaidi, Hani Attar","doi":"10.1109/EICEEAI56378.2022.10050448","DOIUrl":null,"url":null,"abstract":"Since data security is an important branch of the wide concept of security, using simple and interpretable data security methods is deemed necessary. A considerable volume of data that is transferred through the internet is in the form of image. Therefore, several methods have focused on encrypting and decrypting images but some of the conventional algorithms are complex and time consuming. On the other hand, denial method or steganography has attracted the researchers' attention leading to more security for transferring images. This is because attackers are not aware of encryption on images and therefore they do not try to decrypt them. Here, one of the most effective and simplest operators (XOR) is employed. The received shares in destination only with XOR operation can recover original images. Users are not necessary to be familiar with computer programing, data coding and the execution time is lesser compared to chaos-based methods or coding table. Nevertheless, for designing the key when we have messy images, we use chaotic functions. Here, in addition to use the XOR operation, eliminating the pixel expansion and meaningfulness of the shared images is of interest. This method is simple and efficient and use both encryption and steganography; therefore, it can guarantee the security of transferred images.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EICEEAI56378.2022.10050448","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Since data security is an important branch of the wide concept of security, using simple and interpretable data security methods is deemed necessary. A considerable volume of data that is transferred through the internet is in the form of image. Therefore, several methods have focused on encrypting and decrypting images but some of the conventional algorithms are complex and time consuming. On the other hand, denial method or steganography has attracted the researchers' attention leading to more security for transferring images. This is because attackers are not aware of encryption on images and therefore they do not try to decrypt them. Here, one of the most effective and simplest operators (XOR) is employed. The received shares in destination only with XOR operation can recover original images. Users are not necessary to be familiar with computer programing, data coding and the execution time is lesser compared to chaos-based methods or coding table. Nevertheless, for designing the key when we have messy images, we use chaotic functions. Here, in addition to use the XOR operation, eliminating the pixel expansion and meaningfulness of the shared images is of interest. This method is simple and efficient and use both encryption and steganography; therefore, it can guarantee the security of transferred images.
基于异或和混沌密钥的可视化密码提高组织安全性
由于数据安全是广泛的安全概念的一个重要分支,因此使用简单且可解释的数据安全方法被认为是必要的。通过互联网传输的大量数据是以图像的形式传输的。因此,有几种方法都集中在图像的加密和解密上,但一些传统的算法复杂且耗时。另一方面,拒绝方法或隐写术引起了研究人员的注意,从而提高了图像传输的安全性。这是因为攻击者不知道图像上的加密,因此他们不会尝试解密它们。在这里,使用了最有效和最简单的操作符(XOR)之一。接收到的目的地共享只有进行异或操作才能恢复原始图像。用户不需要熟悉计算机编程,数据编码,执行时间比基于混沌的方法或编码表更少。然而,当我们有杂乱的图像时,我们使用混沌函数来设计键。在这里,除了使用异或操作之外,消除共享图像的像素扩展和意义也是有趣的。该方法简单有效,同时使用了加密和隐写技术;因此,它可以保证传输图像的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信