Abstract
The existing image encryption algorithms encrypt images independently, which means the probability of an eavesdropper working out one image stays the same under the same circumstances (same bits of keys and the same algorithm, for example). However, in real-life applications such as communication systems, on one hand, sequences of images may need to be sent with various security demands, and on the other hand, the temporal order of sequences of images may be changed. This paper proposes a novel idea to integrate the notion of temporal order with cryptosystems. Experimental results show that satisfactory security performance is achieved when the order for the sequence of images is changed.
Original language | English |
---|---|
Title of host publication | Third International Conference on Communications and Mobile Computing |
Editors | Dongfeng Yuan, Maoyong Cao, Cheng-Xiang Wang, Hua Huang |
Publisher | IEEE |
Pages | 23-28 |
Number of pages | 6 |
ISBN (Print) | 9780769543574 |
DOIs | |
Publication status | Published - 18 Apr 2011 |
Event | Third International Conference on Communications and Mobile Computing - Qingdao, 18-20 April, 2011 Duration: 18 Apr 2011 → … |
Conference
Conference | Third International Conference on Communications and Mobile Computing |
---|---|
Period | 18/04/11 → … |