Mostrar el registro sencillo del ítem

dc.contributor.authorDuarte, Sergiospa
dc.contributor.authorBecerra Romero, David Camilospa
dc.contributor.authorPinzón Ardila, Yoan Joséspa
dc.date.accessioned2020-10-27T00:20:47Z
dc.date.available2020-10-27T00:20:47Z
dc.date.issued2009-06-01
dc.identifier.issn2539-2115
dc.identifier.issn1657-2831
dc.identifier.urihttp://hdl.handle.net/20.500.12749/8968
dc.description.abstractEn este artículo, se presenta un método novedoso para el cifrado de imágenes basado en un Se presenta el Teorema del Resto Chino Generalizado (GCRT). El método propuesto se basa en el trabajo desarrollado por Jagannathan et al. Se proponen algunas modificaciones para aumentar la calidad de cifrado del método y su robustez contra ataques En concreto, la inclusión de un vector para reducir la espacio de píxel de segmento y un resto chino generalizado Se propone el algoritmo del teorema (GCRT). Estos vectores son generada aleatoriamente lo que permite su uso como claves privadas uniéndose estos valores clave sin restricciones generados por el algoritmo GCRT. Un análisis para estudiar un sistema donde se encuentran los canales RGB se realiza un cifrado independiente. Algunos experimentos fueron llevado a cabo para validar el modelo propuesto obteniendo muy resultados prometedores.spa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.publisherUniversidad Autónoma de Bucaramanga UNAB
dc.relationhttps://revistas.unab.edu.co/index.php/rcc/article/view/1136/1106
dc.relation.urihttps://revistas.unab.edu.co/index.php/rcc/article/view/1136
dc.rightsDerechos de autor 2009 Revista Colombiana de Computación
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.5/co/
dc.sourceRevista Colombiana de Computación; Vol. 10 Núm. 1 (2009): Revista Colombiana de Computación; 45-60
dc.subjectCifrado de imágenes
dc.subjectTeorema del resto chino
dc.subjectAlgoritmos
dc.subjectSeguridad de información
dc.titleUn nuevo algoritmo de resto chino para el cifrado basado en imágenesspa
dc.title.translatedA new chinese remainder algorithm for image-based encryptioneng
dc.type.driverinfo:eu-repo/semantics/article
dc.type.localArtículospa
dc.type.coarhttp://purl.org/coar/resource_type/c_7a1f
dc.subject.keywordsImage encryptioneng
dc.subject.keywordsChinese remainder theoremeng
dc.subject.keywordsAlgorithmseng
dc.subject.keywordsInformation securityeng
dc.subject.keywordsTechnological developmenteng
dc.subject.keywordsTechnological innovationseng
dc.subject.keywordsComputer's scienceeng
dc.subject.keywordsTechnology of the information and communicationeng
dc.identifier.instnameinstname:Universidad Autónoma de Bucaramanga UNABspa
dc.type.hasversioninfo:eu-repo/semantics/acceptedVersion
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.relation.referencesVikram Jagannathan, R. Hariharan, Aparna Mahadevan and E.Srinivasan, Number theory based image compression encryption and application to image multiplexing. IEEE Signal 58 Sergio Duarte1, David Becerra y Yoan Pinzón Processing, Communications and Networking, International conference, pp. 56-64, 2007.
dc.relation.referencesS.Wong, L. Zaremba, D. Gooden, and H. K. Huang, Feb. Radiologic Image Compression-A review, Proc. IEEE, vol. 83, pp. 194–219, 1995.
dc.relation.referencesLin, K.-Y.; Krishna, B.; Krishna, H . Rings, fields, the Chinese remainder theorem and an extension-Part I: theory. IEEE Transactions on [see also Circuits and Systems II: Express Briefs, IEEE Transactions on] Volume 41, Issue 10, pp. 641 – 655, 1994.
dc.relation.referencesGeorge P. Mulopulos, Laszlo S. Gasztonyi, Albert A. Hernandez, Peak Signal to Noise Ratio Performance Comparison of JPEG and JPEG 2000 for Various Medical Image Modalities. Symposium on Computer Applications, 2003.
dc.relation.referencesG. Unnikrishnan and Kehar Singh. Double random fractional bourier-domain encoding for optical security. Optical engineering, 39(11) pp. 2853–2859, 2000.
dc.relation.referencesL. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the ACM Multimedia 1996, pp 219–229, 1996.
dc.relation.referencesChung-Ping Wu and C.-C. Jay Kuo. Fast encryption methods for audiovisual data confidentiality. In SPIE Photonics East - Symposium on Voice, Video, and Data Communications, volume 4209, pp 284–295, 2000.
dc.relation.referencesDaniel Socek, Shujun Li, Spyros S. Magliveras and Borko Furht, Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. In Proceedings of the First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pp. 406-408, 2005.
dc.relation.referencesAndreas Uhl, Andreas Pommer. Image and Video Encryption From Digital Rights Management to Secured Personal Communication, In Advances in Information Security, Springer, 2005.
dc.relation.referencesChung-Ping Wu and C.-C. Jay Kuo. Efficient multimedia encryption via entropy codec design. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, volume 4314, 2001.
dc.relation.referencesXiliang Lu and Ahmet M. Eskicioglu. Selective encryption of multimedia content in distribution networks: Challenges and new directions. In Proceedings of the IASTED International Conference on Communications, Internet and Information Technology (CIIT2003), Scottsdale, AZ, USA, 2003.
dc.relation.referencesL.E. Dickson. History of the theory of numbers. Vol. II: 59 A New Chinese Remainder Algorithm for Image-based Encryption Diophantine analysis. Chelsea Publishing Co., New York, 1966.
dc.relation.referencesKang Sheng Shen. Historical development of the Chinese remainder theorem. Arch. Hist. Exact Sci., 38(4): pp 285-305, 1988.
dc.relation.referencesC. Ding, D. Pei, and A. Salomaa, Chinese Remainder Theorem: Applications in Computing, Coding and Cryptography. World Scientific Publishing, 1997.
dc.relation.referencesO. Ore, The General Chinese Remainder Theorem, Yale University, The American Mathematical Monthly, Vol. 59, No. 6 pp. 365-370, July 1952.
dc.subject.lembDesarrollo tecnológicospa
dc.subject.lembInnovaciones tecnológicasspa
dc.subject.lembCiencias de la computaciónspa
dc.subject.lembTecnologías de la información y la comunicaciónspa
dc.identifier.repourlrepourl:https://repository.unab.edu.co
dc.description.abstractenglishIn this paper, a novel method for image encryption based on a Generalized Chinese Remainder Theorem (GCRT) is presented. The proposed method is based on the work developed by Jagannathan et al. Some modifications are proposed in order to increase the method's encryption quality and its robustness against attacks. Specifically, the inclusion of a vector to reduce the segment pixel space and a Generalized Chinese Remainder Theorem (GCRT) algorithm are proposed. These vectors are generated randomly which allows its use as private keys joining these unrestricted key values generated by the GCRT algorithm. An analysis to study a system where the RGB channels are independently encrypted is performed. Some experiments were carried out to validate the proposed model obtaining very promising results.eng
dc.subject.proposalCifrado de imagenspa
dc.subject.proposalTeorema del resto chinospa
dc.subject.proposalAlgoritmosspa
dc.subject.proposalSeguridad de informaciónspa
dc.type.redcolhttp://purl.org/redcol/resource_type/CJournalArticle
dc.rights.creativecommonsAttribution-NonCommercial-ShareAlike 4.0 International*


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-ShareAlike 4.0 International
Excepto si se señala otra cosa, la licencia del ítem se describe como Attribution-NonCommercial-ShareAlike 4.0 International