The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new approach of digital image encryption is proposed based on the fractional Fourier transform and chaos. The algorithm can be summarized as follows. Firstly, scramble the image in time domain with chaos, and then combine it and the discrete fractional Fourier transform in X direction. Secondly, scramble the image obtained in the fractional Fourier domain with chaos, and then combine it and the...
This paper proposes a novel confusion and diffusion algorithm for image encryption based on logistic map and cheat image. We choose the initial condition and control parameter of logistic map as the secret key. The cheat image selected from the most common images in public network, together with the chaotic matrices generated by logistic maps, is employed both in encryption and decryption processes...
In this paper, we proposed a new image encryption algorithm, that is based on Arnold cat map and logistic chaotic system to improve the security of the image transmission. An input image can be shuffled by iterative using Arnold cat map operations. But, after several iterations the shuffle image will return to the original image. It is obvious that we cannot using the Arnold cat map only to promise...
In this paper, we present two new methods for Image Encryption. The first is an image encryption algorithm based on improved 3D cat map and the second method is based on the generalized 3D Arnold transformation. The new algorithm employs Henon map chaotic sequence to generate control parameters of shuffling and uses improved 2D Logistic map sequence to substitute grey values. Shuffling the positions...
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic sequences and wavelet transform. This algorithm controls the initial parameters of two one-dimensional chaotic sequences through keys, generates the chaotic sequence, diffuses the image,...
According to the particular properties of discrete chaotic sequences, and combining the structure characters of digital images, obeying the common encryption principles of digital images, a discrete chaotic exclusive OR encryption scheme of digital images is carefully studied and proposed. In the light of the size of a digital image which needs to be encrypted, and producing a corresponding binary...
Combined the image encryption and hiding technique, this paper proposed a method of color image protective transmission based on Logistic map and LSB hiding algorithm. Firstly, Logistic map produced three chaotic sequences by one secret-key. Secondly, the image pixel matrixs of R,G,B were permuted by the chaotic sequences and digital image encryption was realized in the space domain. Finally, the...
A security of an image encryption scheme based on improved chaotic cat maps was analyzed. In these analyses, it has revealed some rules of key information leaking in certain instances, and has pointed out that the algorithm is insensitive to both the control parameters and the changes of plaintext. In the condition of known-image attack, an equivalent key-solved algorithm about once iteration and...
In this work, we propose a color image encryption of variable sizes using logistic chaotic map. We considered a process of permutation, followed by a diffusion algorithm. To evaluate this encryption method's performance, we applied a statistical analysis, and developed histograms of the original and encrypted images. For the correlation analysis, we evaluate the behavior of two adjacent pixels on...
Recently, several image cryptographic algorithms based on chaotic maps have been proposed. These algorithms differ in various aspects such as the type of chaotic maps used, methods used for confusion and diffusion, key size, and manipulating images as 2D or 3D. In this paper, a new image encryption algorithm based on chaotic maps is proposed. The algorithm is inspired by two bio-operations: crossover...
In this paper, we proposed a modified chaotic based image encryption scheme using two logistic maps and two-dimensional baker map. In encryption process pixel, integration of diffusion and chaotic confusion are adopted. For pixel diffusion, we employed two-dimensional baker map to shuffle the positions of image pixels which can diffuse the relationship between the cipher-image and plain-image. Further,...
The focus of this paper is the security of industrial design images. An encryption algorithm, based on the Logistic and the Henon maps, is proposed. The algorithm aims to ensure the security of industrial design images, and uses chaotic iteration to generate the encryption keys, and then carries out the XOR and cyclic shift operations on the plain text to change the values of image pixels. The algorithm...
Recently, chaos has attracted much attention in the field of cryptography. It describes a dynamical system which is sensitive to initial condition. It generates apparently random behavior but at the same time the system is completely deterministic. Towards this direction, this paper presents a new encryption scheme based on a new chaotic map derived from a simplified model of Swarm Intelligence (SI)...
In order to solve the problems of Gao algorithm, an improvement of Gao algorithm is proposed in this paper. Firstly, the shuffling procedure is combined with pixel diffusion to solve the problem that permutation isn't relative to the pixel values in Gao algorithm. Secondly, to solve the problem that the keystream isn't sensitive to plaintext in Gao algorithm, the feedback mechanism is introduced in...
With the development of network technique, the research of information security technique is becoming more and more important. In this paper, we proposed a new image encryption and steganography scheme. First, the secret message is encrypted through the combination of a new gray value substitution operation and position permutation which makes the encryption system strong. And then the processed secret...
Cryptography is an important technique to keep private data secretly in order to avoid unauthorized access. Traditional encryption methods such as DES, RSA etc... are widely used today and it seems to be computationally secure. Chaotic encryption is the new direction of cryptography and only few papers discuss on it, and it makes use of chaotic system properties such as sensitive to initial condition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.