dc.contributor.author | Duarte, Sergio | spa |
dc.contributor.author | Becerra Romero, David Camilo | spa |
dc.contributor.author | Pinzón Ardila, Yoan José | spa |
dc.date.accessioned | 2020-10-27T00:20:47Z | |
dc.date.available | 2020-10-27T00:20:47Z | |
dc.date.issued | 2009-06-01 | |
dc.identifier.issn | 2539-2115 | |
dc.identifier.issn | 1657-2831 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12749/8968 | |
dc.description.abstract | En este artículo, se presenta un método novedoso para el cifrado de imágenes basado en un
Se presenta el Teorema del Resto Chino Generalizado (GCRT).
El método propuesto se basa en el trabajo desarrollado por
Jagannathan et al. Se proponen algunas modificaciones para
aumentar la calidad de cifrado del método y su robustez contra
ataques En concreto, la inclusión de un vector para reducir la
espacio de píxel de segmento y un resto chino generalizado
Se propone el algoritmo del teorema (GCRT). Estos vectores son
generada aleatoriamente lo que permite su uso como claves privadas uniéndose
estos valores clave sin restricciones generados por el algoritmo GCRT.
Un análisis para estudiar un sistema donde se encuentran los canales RGB
se realiza un cifrado independiente. Algunos experimentos fueron
llevado a cabo para validar el modelo propuesto obteniendo muy
resultados prometedores. | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.publisher | Universidad Autónoma de Bucaramanga UNAB | |
dc.relation | https://revistas.unab.edu.co/index.php/rcc/article/view/1136/1106 | |
dc.relation.uri | https://revistas.unab.edu.co/index.php/rcc/article/view/1136 | |
dc.rights | Derechos de autor 2009 Revista Colombiana de Computación | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/2.5/co/ | |
dc.source | Revista Colombiana de Computación; Vol. 10 Núm. 1 (2009): Revista Colombiana de Computación; 45-60 | |
dc.subject | Cifrado de imágenes | |
dc.subject | Teorema del resto chino | |
dc.subject | Algoritmos | |
dc.subject | Seguridad de información | |
dc.title | Un nuevo algoritmo de resto chino para el cifrado basado en imágenes | spa |
dc.title.translated | A new chinese remainder algorithm for image-based encryption | eng |
dc.type.driver | info:eu-repo/semantics/article | |
dc.type.local | Artículo | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_7a1f | |
dc.subject.keywords | Image encryption | eng |
dc.subject.keywords | Chinese remainder theorem | eng |
dc.subject.keywords | Algorithms | eng |
dc.subject.keywords | Information security | eng |
dc.subject.keywords | Technological development | eng |
dc.subject.keywords | Technological innovations | eng |
dc.subject.keywords | Computer's science | eng |
dc.subject.keywords | Technology of the information and communication | eng |
dc.identifier.instname | instname:Universidad Autónoma de Bucaramanga UNAB | spa |
dc.type.hasversion | info:eu-repo/semantics/acceptedVersion | |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.relation.references | Vikram Jagannathan, R. Hariharan, Aparna Mahadevan and
E.Srinivasan, Number theory based image compression
encryption and application to image multiplexing. IEEE Signal
58
Sergio Duarte1, David Becerra y Yoan Pinzón
Processing, Communications and Networking,
International conference, pp. 56-64, 2007. | |
dc.relation.references | S.Wong, L. Zaremba, D. Gooden, and H. K. Huang, Feb.
Radiologic Image Compression-A review, Proc. IEEE, vol. 83,
pp. 194–219, 1995. | |
dc.relation.references | Lin, K.-Y.; Krishna, B.; Krishna, H . Rings, fields, the Chinese
remainder theorem and an extension-Part I: theory. IEEE
Transactions on [see also Circuits and Systems II: Express
Briefs, IEEE Transactions on] Volume 41, Issue 10, pp. 641 –
655, 1994. | |
dc.relation.references | George P. Mulopulos, Laszlo S. Gasztonyi, Albert A.
Hernandez, Peak Signal to Noise Ratio Performance
Comparison of JPEG and JPEG 2000 for Various Medical
Image Modalities. Symposium on Computer Applications,
2003. | |
dc.relation.references | G. Unnikrishnan and Kehar Singh. Double random fractional
bourier-domain encoding for optical security. Optical
engineering, 39(11) pp. 2853–2859, 2000. | |
dc.relation.references | L. Tang. Methods for encrypting and decrypting MPEG video
data efficiently. In Proceedings of the ACM Multimedia 1996, pp
219–229, 1996. | |
dc.relation.references | Chung-Ping Wu and C.-C. Jay Kuo. Fast encryption methods for
audiovisual data confidentiality. In SPIE Photonics East -
Symposium on Voice, Video, and Data Communications, volume
4209, pp 284–295, 2000. | |
dc.relation.references | Daniel Socek, Shujun Li, Spyros S. Magliveras and Borko
Furht, Enhanced 1-D Chaotic Key-Based Algorithm for
Image Encryption. In Proceedings of the First IEEE/CreateNet
International Conference on Security and Privacy for Emerging
Areas in Communication Networks (SecureComm 2005), pp.
406-408, 2005. | |
dc.relation.references | Andreas Uhl, Andreas Pommer. Image and Video Encryption
From Digital Rights Management to Secured Personal
Communication, In Advances in Information Security, Springer,
2005. | |
dc.relation.references | Chung-Ping Wu and C.-C. Jay Kuo. Efficient multimedia
encryption via entropy codec design. In Proceedings of SPIE,
Security and Watermarking of Multimedia Contents III, San
Jose, CA, USA, volume 4314, 2001. | |
dc.relation.references | Xiliang Lu and Ahmet M. Eskicioglu. Selective encryption of
multimedia content in distribution networks: Challenges and
new directions. In Proceedings of the IASTED International
Conference on Communications, Internet and Information
Technology (CIIT2003), Scottsdale, AZ, USA, 2003. | |
dc.relation.references | L.E. Dickson. History of the theory of numbers. Vol. II:
59
A New Chinese Remainder Algorithm for Image-based Encryption
Diophantine analysis. Chelsea Publishing Co., New York, 1966. | |
dc.relation.references | Kang Sheng Shen. Historical development of the Chinese
remainder theorem. Arch. Hist. Exact Sci., 38(4): pp 285-305,
1988. | |
dc.relation.references | C. Ding, D. Pei, and A. Salomaa, Chinese Remainder Theorem:
Applications in Computing, Coding and Cryptography. World
Scientific Publishing, 1997. | |
dc.relation.references | O. Ore, The General Chinese Remainder Theorem, Yale
University, The American Mathematical Monthly, Vol. 59, No. 6
pp. 365-370, July 1952. | |
dc.subject.lemb | Desarrollo tecnológico | spa |
dc.subject.lemb | Innovaciones tecnológicas | spa |
dc.subject.lemb | Ciencias de la computación | spa |
dc.subject.lemb | Tecnologías de la información y la comunicación | spa |
dc.identifier.repourl | repourl:https://repository.unab.edu.co | |
dc.description.abstractenglish | In this paper, a novel method for image encryption based on a
Generalized Chinese Remainder Theorem (GCRT) is presented.
The proposed method is based on the work developed by
Jagannathan et al. Some modifications are proposed in order to
increase the method's encryption quality and its robustness against
attacks. Specifically, the inclusion of a vector to reduce the
segment pixel space and a Generalized Chinese Remainder
Theorem (GCRT) algorithm are proposed. These vectors are
generated randomly which allows its use as private keys joining
these unrestricted key values generated by the GCRT algorithm.
An analysis to study a system where the RGB channels are
independently encrypted is performed. Some experiments were
carried out to validate the proposed model obtaining very
promising results. | eng |
dc.subject.proposal | Cifrado de imagen | spa |
dc.subject.proposal | Teorema del resto chino | spa |
dc.subject.proposal | Algoritmos | spa |
dc.subject.proposal | Seguridad de información | spa |
dc.type.redcol | http://purl.org/redcol/resource_type/CJournalArticle | |
dc.rights.creativecommons | Attribution-NonCommercial-ShareAlike 4.0 International | * |