Mohammed Es-Sabry, N. El Akkad, M. Merras, A. Saaidi, K. Satori
{"title":"灰度图像加密使用移位位操作","authors":"Mohammed Es-Sabry, N. El Akkad, M. Merras, A. Saaidi, K. Satori","doi":"10.1109/ISACV.2018.8354028","DOIUrl":null,"url":null,"abstract":"In this work, we propose a method of cryptography of grayscale images. The principle of this approach is to encrypt any image (called the original image), into a sequence of N images whose (N-1) are generated randomly and the Nth image is determined from the original image and the (N-1) generated images. A key will be used in order to increase the security of the image transmitted to the receiver. The pixels of the original image are first converted into bits and then we use the shift bits operators to obtain a matrix, which will be used in the encryption procedure. All N images as well as the key used are needed in the decryption process, to obtain the source image. Experiments show the importance and quality of the approach that we proposed in terms of accuracy.","PeriodicalId":184662,"journal":{"name":"2018 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Grayscale image encryption using shift bits operations\",\"authors\":\"Mohammed Es-Sabry, N. El Akkad, M. Merras, A. Saaidi, K. Satori\",\"doi\":\"10.1109/ISACV.2018.8354028\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, we propose a method of cryptography of grayscale images. The principle of this approach is to encrypt any image (called the original image), into a sequence of N images whose (N-1) are generated randomly and the Nth image is determined from the original image and the (N-1) generated images. A key will be used in order to increase the security of the image transmitted to the receiver. The pixels of the original image are first converted into bits and then we use the shift bits operators to obtain a matrix, which will be used in the encryption procedure. All N images as well as the key used are needed in the decryption process, to obtain the source image. Experiments show the importance and quality of the approach that we proposed in terms of accuracy.\",\"PeriodicalId\":184662,\"journal\":{\"name\":\"2018 International Conference on Intelligent Systems and Computer Vision (ISCV)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Intelligent Systems and Computer Vision (ISCV)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISACV.2018.8354028\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Intelligent Systems and Computer Vision (ISCV)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISACV.2018.8354028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Grayscale image encryption using shift bits operations
In this work, we propose a method of cryptography of grayscale images. The principle of this approach is to encrypt any image (called the original image), into a sequence of N images whose (N-1) are generated randomly and the Nth image is determined from the original image and the (N-1) generated images. A key will be used in order to increase the security of the image transmitted to the receiver. The pixels of the original image are first converted into bits and then we use the shift bits operators to obtain a matrix, which will be used in the encryption procedure. All N images as well as the key used are needed in the decryption process, to obtain the source image. Experiments show the importance and quality of the approach that we proposed in terms of accuracy.