Temporal ordered image encryption

X. Zhou, J. Ma, Miltiadis Petridis, W. Du

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBN

Abstract

The existing image encryption algorithms encrypt images independently, which means the probability of an eavesdropper working out one image stays the same under the same circumstances (same bits of keys and the same algorithm, for example). However, in real-life applications such as communication systems, on one hand, sequences of images may need to be sent with various security demands, and on the other hand, the temporal order of sequences of images may be changed. This paper proposes a novel idea to integrate the notion of temporal order with cryptosystems. Experimental results show that satisfactory security performance is achieved when the order for the sequence of images is changed.
Original languageEnglish
Title of host publicationThird International Conference on Communications and Mobile Computing
EditorsDongfeng Yuan, Maoyong Cao, Cheng-Xiang Wang, Hua Huang
PublisherIEEE
Pages23-28
Number of pages6
ISBN (Print)9780769543574
DOIs
Publication statusPublished - 18 Apr 2011
EventThird International Conference on Communications and Mobile Computing - Qingdao, 18-20 April, 2011
Duration: 18 Apr 2011 → …

Conference

ConferenceThird International Conference on Communications and Mobile Computing
Period18/04/11 → …

Fingerprint Dive into the research topics of 'Temporal ordered image encryption'. Together they form a unique fingerprint.

Cite this