49 Hits in 6.5 sec

A novel image encryption algorithm based on chaotic sequences and cross-diffusion of bits

Geng Shengtao, Wu Tao, Wang Shida, Zhang Xuncai, Niu Ying
2020 IEEE Photonics Journal  
To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion.  ...  Secondly, the scrambled image is transformed into a one-dimensional sequence, and the low-order bits between every two pixels are fused to change the detailed information of the image, improved the ability  ...  Chai [23] proposed an image encryption algorithm based on Brownian motion, the bit pixels in each bit plane are used as Brownian motion particles to scramble the 8-bit planes of ordinary images, and  ... 
doi:10.1109/jphot.2020.3044222 fatcat:ulpu7mp73vh4vefxlsg4smitwu

A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations

Fawad Masood, Maha Driss, Wadii Boulila, Jawad Ahmad, Sadaqat Ur Rehman, Sana Ullah Jan, Abdullah Qayyum, William J. Buchanan
2021 Wireless personal communications  
In this work, we propose a lightweight cryptosystem based on Henon chaotic map, Brownian motion, and Chen's chaotic system to encrypt medical images with elevated security.  ...  The experimental results show that the proposed cryptosystem is a lightweight approach that can achieve the desired security level for encrypting confidential image-based patients' information.  ...  An enhanced image encryption scheme is proposed that combines chaos theory with Brownian motion (BM) and Chen's chaotic system (CCS) to achieve the desired level of security in storage systems of hospitals  ... 
doi:10.1007/s11277-021-08584-z fatcat:r6elxupxlnapdmunh7l4bu42ti

When an attacker meets a cipher-image in 2018: A Year in Review [article]

Chengqing Li, Yun Zhang, Eric Yong Xie
2019 arXiv   pre-print
The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may  ...  This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of  ...  DCIE follows the structure of PTDWOS and uses 3-D Brownian motion, a 3-D autonomous chaotic system and 2D-LASM as PRNG to control its basic components.  ... 
arXiv:1903.11764v2 fatcat:uoun46alavexflmuvcbtlinlqm

An image encryption algorithm based on bisection method and one-dimensional piecewise chaotic map

Aesha Elghandour, Ahmed Salah, Yasser Elmasry, Abdelrahman Karawia
2021 IEEE Access  
In this article, an image encryption algorithm via bisection method and one-dimensional piecewise chaotic map is proposed. It depends on the permutation-substitution model.  ...  Bit-wise XOR operation with a mask generated from the Tent chaotic map is applied on shuffled image to increase the protection of the proposed algorithm.  ...  [5] suggested an image encryption algorithm based on 1D chaotic tent map. A new 1D chaotic map based on Beta function created in [6] and used in the image encryption scheme.  ... 
doi:10.1109/access.2021.3065810 fatcat:gmox3hovpbgqffoxyh3exsoswy

A Comprehensive Review About Image Encryption Methods

2022 Harran Üniversitesi Mühendislik Dergisi  
Studies on both colored and gray level images have been handled together.  ...  In this study, 131 articles were examined and image encryption methods were classified according to the traditional methods, some new methods or combinations of some methods, that they contain.  ...  A hyper-chaotic system and chaotic control parameters based robust hybrid image encryption algorithm is proposed in [41] .  ... 
doi:10.46578/humder.1066545 fatcat:uoq5vxftergjbp74ssrrdcwyn4

Color Image Encryption with a Novel Technique and Chaotic Singer Map

Araz B. Karim, Peshraw S. Abdalqader, Ziyad T. Najim, Abbas M. Salhd, Omar Y. Abdulhammed
2021 Science Journal of University of Zakho  
In the fourth stage, the logical XOR operator is applied to encrypt the image based on the three matrix and secret keys.  ...  One of the extreme efficient, important, and necessary means used to preserve the information and contents of the image through sending it over the Internet or network communication is image encryption  ...  2] Gan Z, Chai X, Zhang M, Lu Y (2018), "A double color image encryption scheme based on three-dimensional brownian motion".  ... 
doi:10.25271/sjuoz.2021.9.3.816 fatcat:cy63xzda6zeczphww7dou2zfha

Applicable Image Security Based on New Hyperchaotic System

Jingya Wang, Xianhua Song, Huiqiang Wang, Ahmed A. Abd El-Latif
2021 Symmetry  
The new system combined with two-dimensional Logistic-Sine Coupling Mapping (2D-LSCM) is further applied to an image encryption application.  ...  Symmetric keys are generated during this operation, which can be applied to the proposed image encryption and decryption algorithms.  ...  Therefore, a new symmetric image encryption algorithm based on this system is proposed in the paper.  ... 
doi:10.3390/sym13122290 fatcat:xquej7pl2jb2xhkph3pa6f3ta4

A New Digital Image Encryption Algorithm Based on Improved Logistic Mapping and Josephus Circle

Zhiben Zhuang, Jing Wang, Jingyi Liu, Dingding Yang, Shiqiang Chen
2018 Journal of Computer and Communications  
Digital image encryption based on Joseph circle and Chaotic system has become a hot spot in the research of image encryption.  ...  An encryption algorithm based on improved Josephus loop and logistic mapping is proposed to scrambling blocks in this paper.  ...  [17] proposed an image encryption algorithm based on Brownian motion and image, and introduced a new one-dimensional chaotic system.  ... 
doi:10.4236/jcc.2018.66003 fatcat:nadoor43mfg6dpkebqrnzp7r3m

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Adel R. Alharbi, Jawad Ahmad, Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, William J Buchanan, Atila Bueno
2022 Complexity  
In this work, a secure image encryption scheme is proposed using linear feedback shift register (LFSR) and chaos-based quantum chaotic map.  ...  Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural  ...  Acknowledgments One of the authors, Sajjad Shaukat Jamal, extends his gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through a research group program under  ... 
doi:10.1155/2022/7047282 fatcat:xjfm5hevn5dstjt7mhlu6vemli

A Secure and Lightweight Chaos Based Image Encryption Scheme

Fadia Ali Khan, Jameel Ahmed, Fehaid Alqahtani, Suliman A. Alsuhibany, Fawad Ahmed, Jawad Ahmad
2022 Computers Materials & Continua  
In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffusion.  ...  Through the obtained random sequence, three layers of plain image are encrypted. Finally, with each encrypted layer, Brownian Particles (BP) are XORed that added an extra layer of security.  ...  Tinkerbell Chaotic Map (TBCM) Tinkerbell chaotic map is a two-dimensional chaotic system based on discrete time.  ... 
doi:10.32604/cmc.2022.028789 fatcat:ih44sb3nzfe2jbd6nkdtf6fara

Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI)

Mohammed Abutaha, Islam Amar, Salman AlQahtani
2022 Entropy  
Encrypting pictures quickly and securely is required to secure image transmission over the internet and local networks.  ...  This may be accomplished by employing a chaotic scheme with ideal properties such as unpredictability and non-periodicity.  ...  [29] suggested a lightweight cryptosystem to encrypt medical pictures with enhanced security based on a Henon chaotic map, Brownian motion, and Chen's chaotic system.  ... 
doi:10.3390/e24040566 pmid:35455229 pmcid:PMC9025433 fatcat:dmwzlsybozh55lytxmaicadzcm

A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion

Linqing Huang, Shuting Cai, Mingqing Xiao, Xiaoming Xiong
2018 Entropy  
To obtain high security and efficiency, a simple chaotic based color image encryption system by using both plaintext related permutation and diffusion is presented in this paper.  ...  key that needs to be sent to the receiver is determined by the original image, so these algorithms may not applicable to real-time image encryption; (3) most plaintext related image encryption schemes  ...  The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.  ... 
doi:10.3390/e20070535 pmid:33265624 fatcat:u66kznm74jgzdebp7gx6rxoe3e

MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection

Ashraf Ahmad, Yousef AbuHour, Remah Younisse, Yasmeen Alslman, Eman Alnagi, Qasem Abu Al-Haija
2022 Journal of Sensor and Actuator Networks  
'Medical images' is one such example of highly demanding security and privacy standards.  ...  Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties.  ...  Also, Chen and Hu [8] have proposed an adaptive encryption algorithm for medical images based on the enhanced chaotic mapping.  ... 
doi:10.3390/jsan11020024 fatcat:acic56reefgovffltssri4o6ya

2D-SCMCI hyperchaotic map for image encryption algorithm

Jilei Sun
2021 IEEE Access  
For the image encryption algorithm using chaotic maps, their security mainly depends on the complexity of chaotic system.  ...  Ever since an image encryption algorithm by 2D chaotic map was first designed by Fridrich [15] , researchers have introduced various image encryption algorithms through chaotic system [16] - [35] .  ...  In addition, using 2D-SCMCI hyperchaotic map, we designed an image encryption algorithm, and security of the proposed encryption algorithm is analyzed.  ... 
doi:10.1109/access.2021.3070350 fatcat:42xtlfgx3jeojahr6ygjli2o3q

A novel image encryption scheme based on Kepler's third law and random Hadamard transform

Yu-Ling Luo, Rong-Long Zhou, Jun-Xiu Liu, Sen-Hui Qiu, Yi Cao
2017 Chinese Physics B  
In this paper, a novel image encryption scheme based on Kepler's third law and random Hadamard transform is proposed to ensure the security of a digital image.  ...  In the end, the permuted image presents interweaving diffusion based on two special matrices, which are constructed by Kepler periodic sequence and chaos system.  ...  [19] a novel image encryption algorithm based on three-dimensional (3D) Brownian motion and chaotic systems was presented to overcome the limitation of movement range of bits.  ... 
doi:10.1088/1674-1056/26/12/120504 fatcat:li26v63pqzftjkxcz7eagndlkq
« Previous Showing results 1 — 15 out of 49 results