Academic literature on the topic 'UACI (Unified Average Changing Intensity)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'UACI (Unified Average Changing Intensity).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "UACI (Unified Average Changing Intensity)"

1

S N, Prajwalasimha, Kavya S R, and Tanaaz Zeba Ahmed. "Design and analysis of pseudo hadamard transformation and non-chaotic substitution based image encryption scheme." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 3 (2019): 1297. http://dx.doi.org/10.11591/ijeecs.v15.i3.pp1297-1304.

Full text
Abstract:
In this paper, Pseudo Hadamard Transformation (PHT) and non-chaotic substitution based image encryption scheme has been proposed. Images are characterized by intrinsic properties such as, strong redundancy and correlation between the adjacent pixels, hence more vulnerable to cyber-attacks. In the proposed technique, the redundancy and correlation have been effectively reduced by pixel position transformation using PHT and pixel value variation using non chaotic substitution, providing two stage security in encryption for images. Fifteen standard test images are considered for experimental analysis. Better average Number of Pixel Changing Rate (NPCR) and Unified Average pixel Changing Intensity (UACI) are obtained for a set of standard test images compared to more popular existing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
2

Fatma, Yulia, Soni, and Mikdad Amseno. "Perbandingan Algoritma SIMON dan SPECK Dalam Pengamanan Citra Digital." Jurnal CoSciTech (Computer Science and Information Technology) 5, no. 2 (2024): 250–59. http://dx.doi.org/10.37859/coscitech.v5i2.7619.

Full text
Abstract:
Cryptography is a data security technique by encoding data that is to be kept secret so that the original meaning of the data can no longer be understood. SIMON and SPECK are modern cryptographic algorithms issued by the National Security Agency (NSA). SIMON and SPECK are said to be algorithms that are known for their efficiency and strong security. This research will compare the performance of the SIMON and SPECK algorithms in securing digital images. Comparisons were made by testing time performance, changes in file size, and the level of randomness of image files using the Unified Average Changing Intensity (UACI) and Number of Pixels Change Rate (NPCR) metrics. The research results show that the average encryption and decryption time required by the SIMON algorithm is greater when compared to the SPECK algorithm. The image file size resulting from encryption using the SIMON and SPECK algorithms both increased by 24% from the original image. The level of randomness of the resulting image based on the UACI value obtained using the SIMON algorithm was found to be an average of 19.65%, while the UACI value obtained using the SPECK algorithm was an average of 20.94%. This shows that there is a significant change in intensity between the original image and the encrypted image. However, not all pixels in the encrypted image change when compared to the original image, this is shown by the NPCR value obtained from the SIMON and SPECK algorithm encrypted image, with average results of 49.98% and 50.17%.
APA, Harvard, Vancouver, ISO, and other styles
3

Obaid, Zahraa Kadhim, and Najlae Falah Hameed Al Saffar. "Image encryption based on elliptic curve cryptosystem." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 2 (2021): 1293. http://dx.doi.org/10.11591/ijece.v11i2.pp1293-1302.

Full text
Abstract:
Image encryption based on elliptic curve cryptosystem and reducing its complexity is still being actively researched. Generating matrix for encryption algorithm secret key together with Hilbert matrix will be involved in this study. For a first case we will need not to compute the inverse matrix for the decryption processing cause the matrix that be generated in encryption step was self invertible matrix. While for the second case, computing the inverse matrix will be required. Peak signal to noise ratio (PSNR), and unified average changing intensity (UACI) will be used to assess which case is more efficiency to encryption the grayscale image.
APA, Harvard, Vancouver, ISO, and other styles
4

Zahraa, Kadhim Obaidand, and Falah Hameed Al Saffar Najlae. "Image encryption based on elliptic curve cryptosystem." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 2 (2021): 1293–302. https://doi.org/10.11591/ijece.v11i2.pp1293-1302.

Full text
Abstract:
Image encryption based on elliptic curve cryptosystem and reducing its complexity is still being actively researched. Generating matrix for encryption algorithm secret key together with Hilbert matrix will be involved in this study. For a first case we will need not to compute the inverse matrix for the decryption processing cause the matrix that be generated in encryption step was self invertible matrix. While for the second case, computing the inverse matrix will be required. Peak signal to noise ratio (PSNR), and unified average changing intensity (UACI) will be used to assess which case is more efficiency to encryption the grayscale image.
APA, Harvard, Vancouver, ISO, and other styles
5

Saidi, Riad, Nada Cherrid, Tarek Bentahar, Hicham Mayache, and Atef Bentahar. "Number of Pixel Change Rate and Unified Average Changing Intensity for Sensitivity Analysis of Encrypted inSAR Interferogram." Ingénierie des systèmes d information 25, no. 5 (2020): 601–7. http://dx.doi.org/10.18280/isi.250507.

Full text
Abstract:
The transmission of images from satellites to earth is on the brink of many threats which can affect the confidentiality of the data as well as its quality. Several encryption algorithms are used to secure the transmitted images. The objective in this work is to analyze the sensitivity of a particular type of satellite image, which is an interferogram from interferometric imaging systems inSAR system. This image is encrypted by cryptosystem based on the Advanced Encryption Standard with key length of 256 bits (AES-256) standard and the asymmetric Rivest, Shamir & Adelman (RSA) encryption algorithm using Counter-mode encryption (CTR) mode and Output FeedBack (OFB) mode. The analysis made in this paper is carried out on two types of sensitivity. The first analysis is the sensitivity to change of a pixel in the original interferogram and the second is the sensitivity to the key. Two parameters are used to assess sensitivity: The Number of Pixel Change Rate (NPCR) and the Unified Average Changing Intensity (UACI). The obtained results show that the two modes AES-256-OFB and AES-256-CTR are favorable but cannot be implemented on board a satellite without providing a mechanism capable of compensating for the low resistance to error propagation. Metrics on the clear and encrypted interferogram are exploited such as the Structural Similarity Index (SSIM), Gradient-based Structural Similarity (GSSIM), The use of these metrics, allowed us to see that a change of one pixel in the interferogram and the change of the encryption key will affect the quality of the interferogram, as well as a statistical histogram analysis.
APA, Harvard, Vancouver, ISO, and other styles
6

Han, Ruifeng. "A Hash-Based Fast Image Encryption Algorithm." Wireless Communications and Mobile Computing 2022 (August 10, 2022): 1–8. http://dx.doi.org/10.1155/2022/3173995.

Full text
Abstract:
Many specialists and academics have recently become interested in the security of digital images in applications for the Internet of Things. Hash-based digital image encryption algorithms with high unified average changing intensity ( UACI > 30.96 percent) and only one pixel difference from the plain image would therefore adjust plenty of the pixels in the cipher image and have indeed been suggested to maintain the protection of images in the Internet of Things ( NPCR > 98.77 percent). Theoretical study and simulation results show that the suggested approach can fix these issues while retaining all the advantages of the original. The proposed image encryption algorithm has important application value for strengthening the security of the Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
7

Ko, Kyung-Kyu, and Eun-Sung Jung. "Development of Cybersecurity Technology and Algorithm Based on Quantum Computing." Applied Sciences 11, no. 19 (2021): 9085. http://dx.doi.org/10.3390/app11199085.

Full text
Abstract:
Many hacking incidents are linked to work files because most companies work with them. However, a variety of file encryption and decryption methods have been proposed. Existing file encryption/decryption technologies are under threat as hacking technologies advance, necessitating the development of stronger encryption algorithms. Therefore, in this study, we propose a modified advanced encryption standard (AES) algorithm and use quantum computing to encrypt/decrypt AES image files. Because the shift is regular during the AES Shift Row procedure, the change technique led the shift to become irregular when using quantum random walk. Computing resources and speeds were simulated using IBM Qiskit quantum simulators for performance evaluation, whereas encryption performance was assessed using number of pixels change rate (NPCR) and unified average changing intensity (UACI).
APA, Harvard, Vancouver, ISO, and other styles
8

Suri, Shelza, and Ritu Vijay. "A Bi-objective Genetic Algorithm Optimization of Chaos-DNA Based Hybrid Approach." Journal of Intelligent Systems 28, no. 2 (2019): 333–46. http://dx.doi.org/10.1515/jisys-2017-0069.

Full text
Abstract:
Abstract The paper implements and optimizes the performance of a currently proposed chaos-deoxyribonucleic acid (DNA)-based hybrid approach to encrypt images using a bi-objective genetic algorithm (GA) optimization. Image encryption is a multi-objective problem. Optimizing the same using one fitness function may not be a good choice, as it can result in different outcomes concerning other fitness functions. The proposed work initially encrypts the given image using chaotic function and DNA masks. Further, GA uses two fitness functions – entropy with correlation coefficient (CC), entropy with unified average changing intensity (UACI), and entropy with number of pixel change rate (NPCR) – simultaneously to optimize the encrypted data in the second stage. The bi-objective optimization using entropy with CC shows significant performance gain over the single-objective GA optimization for image encryption.
APA, Harvard, Vancouver, ISO, and other styles
9

Setiadi, De Rosal Ignatius Moses, and Muhamad Akrom. "Hybrid Quantum Key Distribution Protocol with Chaotic System for Securing Data Transmission." Journal of Computing Theories and Applications 1, no. 2 (2023): 188–200. http://dx.doi.org/10.33633/jcta.v1i2.9547.

Full text
Abstract:
This research proposes a combination of Quantum Key Distribution (QKD) based on the BB84 protocol with Improved Logistic Map (ILM) to improve data transmission security. This method integrates quantum key formation from BB84 with ILM encryption. This combination creates an additional layer of security, where by default, the operation on BB84 is only XOR-substitution, with the addition of ILM creating a permutation operation on quantum keys. Experiments are measured with several quantum measurements such as Quantum Bit Error Rate (QBER), Polarization Error Rate (PER), Quantum Fidelity (QF), Eavesdropping Detection (ED), and Entanglement-based detection (EDB), as well as classical cryptographic analysis such as Bit Error Ratio (BER), Entropy, Histogram Analysis, and Normalized Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI). As a result, the proposed method obtained satisfactory results, especially perfect QF and BER, and EBD, which reached 0.999.
APA, Harvard, Vancouver, ISO, and other styles
10

Donia, Fadhil Chalob, Abdulbaqi Maryoosh Amal, Mohammed Essa Zainab, and Nassir Abbud Elaf. "A new block cipher for image encryption based on multi chaotic systems." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 6 (2020): 2983~2991. https://doi.org/10.12928/TELKOMNIKA.v18i6.13746.

Full text
Abstract:
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system, logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image. The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and key space analyses.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "UACI (Unified Average Changing Intensity)"

1

Banerjee, Uday Kumar, Anup Kumar Das, Rajdeep Ray, and Chandan Koner. "Secure Cryptography Using Chaotic Algorithm." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-7524-9.ch011.

Full text
Abstract:
A chaotic cryptographic method and bit shuffle methodology for image encryption and decoding have both been suggested. In order to evaluate the encryption's effectiveness and determine whether it met the desired standard, a number of performance analysis tools were also used. These included the number of pixel change rate (NPCR), the unified average changing intensity (UACI), the entropy analysis, which is a component of an encryption scheme that shows how random the image is, and the correlation coefficient. These results reveal the safety of the suggested cryptographic technique.
APA, Harvard, Vancouver, ISO, and other styles
2

Zaibi, Ghada, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, and Mounir Samet. "A New Encryption Algorithm based on Chaotic Map for Wireless Sensor Network." In Architectures and Protocols for Secure Information Technology Infrastructures. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4514-1.ch004.

Full text
Abstract:
A new and secure chaos-based block cipher for image encryption in wireless sensor networks is proposed. The security analysis and the performances of the proposed algorithm have been investigated. The statistical analysis includes the histograms and correlation coefficients of adjacent pixels. In the differential analysis, the authors use the Number of Pixels Change Rate (NPCR) and the Unified Changing Average (UACI) measures to demonstrate the security against differential attacks. Key sensitivity analysis and key space analysis show that the proposed cipher is secure and resistant to brute force attack. The authors demonstrate that the performance of the cipher exceeds the studied encryption algorithms as well as AES (Advanced Encryption Standard). An implementation on a real wireless sensor network testbed is realized, and the energy consumption is investigated.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography