2016 24th Signal Processing and Communication Application Conference (SIU) 2016
DOI: 10.1109/siu.2016.7495737
|View full text |Cite
|
Sign up to set email alerts
|

Encryption of Walsh Hadamard Transform applied images with the AES encryption algorithm

Abstract: Özetçe-Gelişen teknoloji bilgi güvenliğini ve gizliliğini tehdit etmektedir. Günümüzde verilerin gizli ve güvenli bir ortamda aktarımının yapılması için, şifreleme metotlarının veya kriptografik sistemlerinin kullanılması kaçınılmazdır. Bu çalışmada resim dosyaları üzerinde nitelik belirleme, metin analizi, filtreleme, sıkıştırma gibi resim işleme teknikleri için kullanılan dönüşümlerden biri olan WHT (Walsh-HadamardTransform) kullanılmıştır. Dönüşüm sonunda elde edilen resmin piksel değerleri simetrik şifrele… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…The need for concealed weapon detection systems has increased tremendously due to a rise in crime and terrorism. Images captured from typical visual and infrared camera systems provide low-contrast images, lacking uniform illumination; reducing visual accuracy [15,16]. Recent developments in image fusion techniques resolve these issues.…”
Section: Methodsmentioning
confidence: 99%
“…The need for concealed weapon detection systems has increased tremendously due to a rise in crime and terrorism. Images captured from typical visual and infrared camera systems provide low-contrast images, lacking uniform illumination; reducing visual accuracy [15,16]. Recent developments in image fusion techniques resolve these issues.…”
Section: Methodsmentioning
confidence: 99%
“…Images are considered as voluminous multimedia and are characterized by properties like high redundancy and strong correlation between pixels [25] , [26] . Images can also withstand minor changes and tampering imperceptibly [27] , [28] , [29] . This property is not exploited by text encryption algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…With the advent of the 5G era, network information security issues have become essential and the security of digital images has attracted the attention of many scholars. At first, researchers used many traditional encryption schemes such as advanced encryption standard (AES), data encryption standard (DES) [1][2][3] etc. to encrypt images.…”
Section: Introductionmentioning
confidence: 99%
“…To improve the encryption effect, some image cryptosystems were designed based on the sequences generated by the chaotic maps. In terms of the spatial domain, these schemes can be roughly classified as: (1) Image encryption based on S-box [6][7][8]. Researchers usually exploit the sequences generated by the chaotic systems to select the data of the S-box to encrypt the original image.…”
Section: Introductionmentioning
confidence: 99%