On the Security of Image Encoding Based on Fractal Functions
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1
Abstract
The information age brings some unique challenges to society. New technology and new applications bring new threats and force us to invent new protection mechanisms. So every few years, computer security needs to reinvent itself. In this paper we propose a new image encoding system utilizing fractal theories; this approach exploits the main feature of fractals generated by IFS techniques. Two levels of encryption and decryption methods performed to enhance the security of the system. The encrypted date represents the attractor generated by the IFS transformation, Collage theorem is used to find the IFS for decrypting data. The proposed method gives the possibility to hide maximum amount of data in an image that represent the attractor of the IFS without degrading its quality. Also to make the hidden data robust enough to withstand known cryptographic attacks and image processing techniques which do not change the appearance of image. The security level is high because the jointly coded images cannot be correctly reconstructed without all the required information.
Authors and Affiliations
Nadia M. G. AL-Saidi
Frequent Item set Mining Using Global Profit Weight Algorithm
The objective of the study focused on weighted based frequent item set mining. The base paper has proposed multi criteria based frequent item set for weight calculation. Contribution towards this project is to implement...
Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization
From the very beginning various measures are taken or consider for better utilization of available limited resources in he computer system for operational environment, this is came n consideration because most of the...
Modified route-maintenance in AODV Routing protocol using static nodes in realistic mobility model
One of the popular wireless network architectures is Mobile Ad Hoc Network (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network...
A Review of Checkpointing Fault Tolerance Techniques in Distributed Mobile Systems
Fault Tolerance Techniques enable systems to perform tasks in the presence of faults. A checkpoint is a local state of a process saved on stable storage. In a distributed system, since the processes in the system do not...
Solving Sparse Rating Problem Using Fine Grained Approach
Recommender System is a system that automatically recommends all similar kind of items that are of user interest. In design of the recommender systems rating is the crucial issue. Till today many algorithms have been pro...