文件名称:FINAL_UTKARSH
- 所属分类:
- matlab例程
- 资源属性:
- [Matlab] [源码]
- 上传时间:
- 2014-09-03
- 文件大小:
- 2.42mb
- 下载次数:
- 0次
- 提 供 者:
- UTKARSH*******
- 相关连接:
- 无
- 下载说明:
- 别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容均来自于网络,请自行研究使用
Image Encryption based on the RGB PIXEL Transposition and Shuffling
Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing the security of digital contents has gained high significance in the current era of breach of security and misuse of the confidential information intercepted and misused by the unauthorized parties.
This paper sets out to contribute to the general body of knowledge in the area of cryptography application and by developing a cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values. The algorithm ultimately makes it possible for encryption and decryption of the images based on the RGB pixel. The algorithm was implemented using MATLAB.
Index Terms — Cryptography, Encryption, algorithm, cipher image
Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing the security of digital contents has gained high significance in the current era of breach of security and misuse of the confidential information intercepted and misused by the unauthorized parties.
This paper sets out to contribute to the general body of knowledge in the area of cryptography application and by developing a cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values. The algorithm ultimately makes it possible for encryption and decryption of the images based on the RGB pixel. The algorithm was implemented using MATLAB.
Index Terms — Cryptography, Encryption, algorithm, cipher image
(系统自动生成,下载前可以参看下载内容)
下载文件列表
FINAL_UTKARSH\Correlation_Coefficient_function
.............\................................\prcorr2.c
.............\................................\prcorr2.dll
.............\................................\prcorr2.m
.............\................................\prcorr2.mexglx
.............\................................\prcorr2.mexw64
.............\histogram_gray
.............\..............\histogram_grayimage_dencrypted.m
.............\..............\histogram_grayimage_encrypted.m
.............\..............\histogram_grayimage_orignal.m
.............\..............\rgbdecrypted.m
.............\..............\rgbencrypted.m
.............\..............\rgborignal.m
.............\histogram_rgb
.............\.............\Decrypted_image_histogram.m
.............\.............\Encrypted_Image_histogram.m
.............\.............\orignal_image_histogram.m
.............\.............\rgbhist5.m
.............\image_encryption_shuffling matrix
.............\.................................\imageProcess_UTKARSH.m
.............\.................................\keyGen.m
.............\.................................\lena256X256.jpg
.............\.................................\main_file_UTKARSH.m
.............\.................................\randomize.m
.............\images_result
.............\.............\project
.............\.............\.......\results
.............\.............\.......\.......\final_output
.............\.............\.......\.......\............\decry_image.png
.............\.............\.......\.......\............\encry_image.png
.............\.............\.......\.......\............\orignal_image.png
.............\.............\.......\.......\histogram_gray
.............\.............\.......\.......\..............\decryptd.png
.............\.............\.......\.......\..............\encryptd.png
.............\.............\.......\.......\..............\orignal.png
.............\.............\.......\.......\..............\Thumbs.db
.............\.............\.......\.......\histogram_rgb
.............\.............\.......\.......\.............\decry
.............\.............\.......\.......\.............\.....\1.png
.............\.............\.......\.......\.............\.....\2.png
.............\.............\.......\.......\.............\.....\3.png
.............\.............\.......\.......\.............\.....\Thumbs.db
.............\.............\.......\.......\.............\ency
.............\.............\.......\.......\.............\....\1.png
.............\.............\.......\.......\.............\....\2.png
.............\.............\.......\.......\.............\....\3.png
.............\.............\.......\.......\.............\....\Thumbs.db
.............\.............\.......\.......\.............\orignal
.............\.............\.......\.......\.............\.......\1.png
.............\.............\.......\.......\.............\.......\2.png
.............\.............\.......\.......\.............\.......\3.png
.............\.............\.......\.......\.............\.......\Thumbs.db
.............\.............\.......\.......\test
.............\.............\.......\.......\....\Correlation Coefficient(encryption_image).png
.............\.............\.......\.......\....\Correlation Coefficient(orignal).png
.............\.............\.......\.......\....\error1.png
.............\.............\.......\.......\....\error3.png
.............\.............\.......\.......\....\NPCR_AND_UACI_test.png
.............\.............\.......\.......\....\Thumbs.db
.............\.............\.......\.......\Thumbs.db
.............\kk
.............\..\image_encryption_shuffling matrix
.............\..\.................................\Decoded.jpg
.............\..\.................................\Encoded.jpg
.............\..\.................................\imageProcess.m
.............\..\.................................\lena256X256.jpg
.............\..\.................................\main_file.m
.............\..\............................