sara, abidsaida, ABDREBBI2022-06-282022-06-282022universite of el ouedhttps://dspace.univ-eloued.dz/handle/123456789/11942mémoier master informatiqueAfter the scientific revolution invaded the world and with the new tools of modern scientific development, it is necessary for every person to protect their personal information related to their daily life. In this topic, there are still some issues, including the speed of decryption encryption, the size of image encryption, and how keys can be shared through a secure route. This end-of-cycle project aims to propose a new version of asymmetric encryption based on the fragmentation of magic numbers. The string cipher is transformed into blocks of blocks and then into a decimal number; Finally, the normal image of these blocks is well encrypted by an MNF-G algorithm.frImage, Cryptage d'image, Décryptage d'image, Sécurité, Préservation de la confidentialité.الصورة، تشفير الصور، فك تشفير الصور، األمن، الحفاظ على الخصوصية.Protection asymétrique des images médicalesMaster