A Digital Image Scrambling Method Based on Serpent

被引:0
作者
Zhang Jinzhu [1 ]
Niu Jiping [2 ]
机构
[1] Guangzhou Radio&TV Univ, Guangzhou 510091, Guangdong, Peoples R China
[2] Huanggang Normal Univ, Coll Comp & Informat Sci, Huanggang 438000, Hubei, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS | 2009年
关键词
SERPENT; disordering of images; S-box; CLUSTERING-ALGORITHM;
D O I
10.1109/MINES.2009.184
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The need for distribution of digital medical images over networks has become an essential part of every day life in medical systems. There are two main factors behind this phenomenon. A new scrambling method of true color images based on Serpent algorithm is proposed. It takes the structure of true color images into full consideration, and decreases the complexity. The analytical method of cryptography is first used in this paper to analyze the security of disordering images; at the same time, Experimental results show that the method is safe, efficient and has great ability of color images.
引用
收藏
页码:171 / +
页数:2
相关论文
共 9 条
[1]  
BIHAM E, 2000, 3 AES C UNPUB
[2]   Copyright protection for the electronic distribution of text documents [J].
Brassil, JT ;
Low, S ;
Maxemchuk, NF .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1181-1196
[3]  
Chen Yunkai, 2006, Wuhan University Journal of Natural Sciences, V11, P1076, DOI 10.1007/BF02829213
[4]  
Dai Jian-hua, 2004, Journal of Fudan University (Natural Science), V43, P856
[5]   A pixel-based scrambling scheme for digital medical images protection [J].
Hu, Jiankun ;
Han, Fengling .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (04) :788-794
[6]   Interword distance changes represented by sine waves for watermarking text images [J].
Huang, D ;
Yan, H .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (12) :1237-1245
[7]   An efficient k-means clustering algorithm:: Analysis and implementation [J].
Kanungo, T ;
Mount, DM ;
Netanyahu, NS ;
Piatko, CD ;
Silverman, R ;
Wu, AY .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (07) :881-892
[8]   A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement [J].
Tzeng, CH ;
Tsai, WH .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (09) :443-445
[9]  
YU DM, 2006, J COMPUTER APPL, V26, P329