Abstract

The encryption and privacy protection of multimedia image resources are of great value in the information age. The utilization of the gyrator transform domain model in multimedia image encryption can select parameters more accurately, so it has a wider scope of utilization and further ameliorates the stability of the whole system. On account of this, this paper first analyzes the concept and connotation of gyrator transform, then studies the image encryption algorithm on account of gyrator transform, and verifies the robustness of the gyrator transform algorithm under the influence of noise interference, shear attack, and other factors through the high robust multimedia image encryption and result analysis of gyrator transform.

Highlights

  • With the iterative maturity and popularization of computer information technology, it has been widely and deeply applied in many fields and achieved remarkable results

  • Under the background of the deepening network threats and attacks faced by the Internet platform, the encryption and privacy protection of information multimedia image resources have become an unavoidable problem and the focus of attention and research by many scholars

  • Linear canonical transformation has the typical advantages of flexibility and stronger processing power, but it has its own shortcomings in the amount of computation and parameter selection [1]

Read more

Summary

Xiaojing Cheng

E encryption and privacy protection of multimedia image resources are of great value in the information age. E utilization of the gyrator transform domain model in multimedia image encryption can select parameters more accurately, so it has a wider scope of utilization and further ameliorates the stability of the whole system. This paper first analyzes the concept and connotation of gyrator transform, studies the image encryption algorithm on account of gyrator transform, and verifies the robustness of the gyrator transform algorithm under the influence of noise interference, shear attack, and other factors through the high robust multimedia image encryption and result analysis of gyrator transform

Introduction
Encrypted image
Exponential additivity
Random phase mask
Mean value
Gyrator DFrWT CFrFT
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.