Hot Search : Source embeded web remote control p2p game More...
Location : Home Downloads SourceCode Mathimatics-Numerical algorithms matlab

FINAL_UTKARSH

  • Category : matlab
  • Tags :
  • Update : 2014-09-03
  • Size : 2.42mb
  • Downloaded :0次
  • Author :UTKARSH SHARMA
  • About : Nobody
  • PS : If download it fails, try it again. Download again for free!
Introduction - If you have any usage issues, please Google them yourself
Image Encryption based on the RGB PIXEL Transposition and Shuffling Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing the security of digital contents has gained high significance in the current era of breach of security and misuse of the confidential information intercepted and misused by the unauthorized parties. This paper sets out to contribute to the general body of knowledge in the area of cryptography application and by developing a cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values. The algorithm ultimately makes it possible for encryption and decryption of the images based on the RGB pixel. The algorithm was implemented using MATLAB. Index Terms — Cryptography, Encryption, algorithm, cipher image
Packet file list
(Preview for download)


FINAL_UTKARSH\Correlation_Coefficient_function
.............\................................\prcorr2.c
.............\................................\prcorr2.dll
.............\................................\prcorr2.m
.............\................................\prcorr2.mexglx
.............\................................\prcorr2.mexw64
.............\histogram_gray
.............\..............\histogram_grayimage_dencrypted.m
.............\..............\histogram_grayimage_encrypted.m
.............\..............\histogram_grayimage_orignal.m
.............\..............\rgbdecrypted.m
.............\..............\rgbencrypted.m
.............\..............\rgborignal.m
.............\histogram_rgb
.............\.............\Decrypted_image_histogram.m
.............\.............\Encrypted_Image_histogram.m
.............\.............\orignal_image_histogram.m
.............\.............\rgbhist5.m
.............\image_encryption_shuffling matrix
.............\.................................\imageProcess_UTKARSH.m
.............\.................................\keyGen.m
.............\.................................\lena256X256.jpg
.............\.................................\main_file_UTKARSH.m
.............\.................................\randomize.m
.............\images_result
.............\.............\project
.............\.............\.......\results
.............\.............\.......\.......\final_output
.............\.............\.......\.......\............\decry_image.png
.............\.............\.......\.......\............\encry_image.png
.............\.............\.......\.......\............\orignal_image.png
.............\.............\.......\.......\histogram_gray
.............\.............\.......\.......\..............\decryptd.png
.............\.............\.......\.......\..............\encryptd.png
.............\.............\.......\.......\..............\orignal.png
.............\.............\.......\.......\..............\Thumbs.db
.............\.............\.......\.......\histogram_rgb
.............\.............\.......\.......\.............\decry
.............\.............\.......\.......\.............\.....\1.png
.............\.............\.......\.......\.............\.....\2.png
.............\.............\.......\.......\.............\.....\3.png
.............\.............\.......\.......\.............\.....\Thumbs.db
.............\.............\.......\.......\.............\ency
.............\.............\.......\.......\.............\....\1.png
.............\.............\.......\.......\.............\....\2.png
.............\.............\.......\.......\.............\....\3.png
.............\.............\.......\.......\.............\....\Thumbs.db
.............\.............\.......\.......\.............\orignal
.............\.............\.......\.......\.............\.......\1.png
.............\.............\.......\.......\.............\.......\2.png
.............\.............\.......\.......\.............\.......\3.png
.............\.............\.......\.......\.............\.......\Thumbs.db
.............\.............\.......\.......\test
.............\.............\.......\.......\....\Correlation Coefficient(encryption_image).png
.............\.............\.......\.......\....\Correlation Coefficient(orignal).png
.............\.............\.......\.......\....\error1.png
.............\.............\.......\.......\....\error3.png
.............\.............\.......\.......\....\NPCR_AND_UACI_test.png
.............\.............\.......\.......\....\Thumbs.db
.............\.............\.......\.......\Thumbs.db
.............\kk
.............\..\image_encryption_shuffling matrix
.............\..\.................................\Decoded.jpg
.............\..\.................................\Encoded.jpg
.............\..\.................................\imageProcess.m
.............\..\.................................\lena256X256.jpg
.............\..\.................................\main_file.m
.............\..\............................
Related instructions
  • We are an exchange download platform that only provides communication channels. The downloaded content comes from the internet. Except for download issues, please Google on your own.
  • The downloaded content is provided for members to upload. If it unintentionally infringes on your copyright, please contact us.
  • Please use Winrar for decompression tools
  • If download fail, Try it againg or Feedback to us.
  • If downloaded content did not match the introduction, Feedback to us,Confirm and will be refund.
  • Before downloading, you can inquire through the uploaded person information

Nothing.

Post Comment
*Quick comment Recommend Not bad Password Unclear description Not source
Lost files Unable to decompress Bad
*Content :
*Captcha :
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.