Ankit Vishnoi, A. Aggarwal, Ajay Prasad, M. Prateek, S. Aggarwal
{"title":"基于同态变换的图像加密","authors":"Ankit Vishnoi, A. Aggarwal, Ajay Prasad, M. Prateek, S. Aggarwal","doi":"10.1109/ICICICT54557.2022.9917824","DOIUrl":null,"url":null,"abstract":"As more and more information is stored and sent electronically, the subject of cryptography has recently gotten a lot of attention. Cryptography is the practice of converting the original data into unreadable from intruders. The process of image encryption follows the image conversion in frequency and from frequency to an 8x8 matrix. The homomorphic transform is used to translate the target image into an 8x8 matrix which further follows simple mathematical calculations to convert the image into encrypted data. In the reverse process from getting the original image, back from the encrypted image. Image cryptographic schemes are to be considered best if they retrieve the original data without causing any loss to the original information. The proposed encryption algorithm is appropriate for applications that demand safe data transfer.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Image Encryption Using Homomorphic Transform\",\"authors\":\"Ankit Vishnoi, A. Aggarwal, Ajay Prasad, M. Prateek, S. Aggarwal\",\"doi\":\"10.1109/ICICICT54557.2022.9917824\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As more and more information is stored and sent electronically, the subject of cryptography has recently gotten a lot of attention. Cryptography is the practice of converting the original data into unreadable from intruders. The process of image encryption follows the image conversion in frequency and from frequency to an 8x8 matrix. The homomorphic transform is used to translate the target image into an 8x8 matrix which further follows simple mathematical calculations to convert the image into encrypted data. In the reverse process from getting the original image, back from the encrypted image. Image cryptographic schemes are to be considered best if they retrieve the original data without causing any loss to the original information. The proposed encryption algorithm is appropriate for applications that demand safe data transfer.\",\"PeriodicalId\":246214,\"journal\":{\"name\":\"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICICT54557.2022.9917824\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICICT54557.2022.9917824","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
As more and more information is stored and sent electronically, the subject of cryptography has recently gotten a lot of attention. Cryptography is the practice of converting the original data into unreadable from intruders. The process of image encryption follows the image conversion in frequency and from frequency to an 8x8 matrix. The homomorphic transform is used to translate the target image into an 8x8 matrix which further follows simple mathematical calculations to convert the image into encrypted data. In the reverse process from getting the original image, back from the encrypted image. Image cryptographic schemes are to be considered best if they retrieve the original data without causing any loss to the original information. The proposed encryption algorithm is appropriate for applications that demand safe data transfer.