Welcome![Sign In][Sign Up]
Location:
Downloads SourceCode Mathimatics-Numerical algorithms matlab
Title: FINAL_UTKARSH Download
 Description: Image Encryption based on the RGB PIXEL Transposition and Shuffling Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing the security of digital contents has gained high significance in the current era of breach of security and misuse of the confidential information intercepted and misused by the unauthorized parties. This paper sets out to contribute to the general body of knowledge in the area of cryptography application and by developing a cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values. The algorithm ultimately makes it possible for encryption and decryption of the images based on the RGB pixel. The algorithm was implemented using MATLAB. Index Terms — Cryptography, Encryption, algorithm, cipher image
 To Search:
File list (Check if you may need any files):
 

FINAL_UTKARSH\Correlation_Coefficient_function
.............\................................\prcorr2.c
.............\................................\prcorr2.dll
.............\................................\prcorr2.m
.............\................................\prcorr2.mexglx
.............\................................\prcorr2.mexw64
.............\histogram_gray
.............\..............\histogram_grayimage_dencrypted.m
.............\..............\histogram_grayimage_encrypted.m
.............\..............\histogram_grayimage_orignal.m
.............\..............\rgbdecrypted.m
.............\..............\rgbencrypted.m
.............\..............\rgborignal.m
.............\histogram_rgb
.............\.............\Decrypted_image_histogram.m
.............\.............\Encrypted_Image_histogram.m
.............\.............\orignal_image_histogram.m
.............\.............\rgbhist5.m
.............\image_encryption_shuffling matrix
.............\.................................\imageProcess_UTKARSH.m
.............\.................................\keyGen.m
.............\.................................\lena256X256.jpg
.............\.................................\main_file_UTKARSH.m
.............\.................................\randomize.m
.............\images_result
.............\.............\project
.............\.............\.......\results
.............\.............\.......\.......\final_output
.............\.............\.......\.......\............\decry_image.png
.............\.............\.......\.......\............\encry_image.png
.............\.............\.......\.......\............\orignal_image.png
.............\.............\.......\.......\histogram_gray
.............\.............\.......\.......\..............\decryptd.png
.............\.............\.......\.......\..............\encryptd.png
.............\.............\.......\.......\..............\orignal.png
.............\.............\.......\.......\..............\Thumbs.db
.............\.............\.......\.......\histogram_rgb
.............\.............\.......\.......\.............\decry
.............\.............\.......\.......\.............\.....\1.png
.............\.............\.......\.......\.............\.....\2.png
.............\.............\.......\.......\.............\.....\3.png
.............\.............\.......\.......\.............\.....\Thumbs.db
.............\.............\.......\.......\.............\ency
.............\.............\.......\.......\.............\....\1.png
.............\.............\.......\.......\.............\....\2.png
.............\.............\.......\.......\.............\....\3.png
.............\.............\.......\.......\.............\....\Thumbs.db
.............\.............\.......\.......\.............\orignal
.............\.............\.......\.......\.............\.......\1.png
.............\.............\.......\.......\.............\.......\2.png
.............\.............\.......\.......\.............\.......\3.png
.............\.............\.......\.......\.............\.......\Thumbs.db
.............\.............\.......\.......\test
.............\.............\.......\.......\....\Correlation Coefficient(encryption_image).png
.............\.............\.......\.......\....\Correlation Coefficient(orignal).png
.............\.............\.......\.......\....\error1.png
.............\.............\.......\.......\....\error3.png
.............\.............\.......\.......\....\NPCR_AND_UACI_test.png
.............\.............\.......\.......\....\Thumbs.db
.............\.............\.......\.......\Thumbs.db
.............\kk
.............\..\image_encryption_shuffling matrix
.............\..\.................................\Decoded.jpg
.............\..\.................................\Encoded.jpg
.............\..\.................................\imageProcess.m
.............\..\.................................\lena256X256.jpg
.............\..\.................................\main_file.m
.............\..\............................

CodeBus www.codebus.net