903 Hits in 6.6 sec

Image Encryption with The Cross Diffusion of Two Chaotic Maps

2019 KSII Transactions on Internet and Information Systems  
In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps.  ...  Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly.  ...  In this paper, along the chaos-based pipeline, we propose an image encryption algorithm based on the cross diffusion of two chaotic maps, namely the Logistic map and the Chebyshev map.  ... 
doi:10.3837/tiis.2019.02.031 fatcat:6bb4wn5eovhb7e5xhixbujspxq

A novel image encryption algorithm based on chaotic sequences and cross-diffusion of bits

Geng Shengtao, Wu Tao, Wang Shida, Zhang Xuncai, Niu Ying
2020 IEEE Photonics Journal  
First, two chaotic sequences are generated by two-dimensional logic-sine coupling mapping, and the original image is scrambled with the two sequences.  ...  To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion.  ...  Enayatifar [11] combined two one-dimensional chaotic mappings into a two-dimensional chaotic mapping for the image encryption. Hua et al.  ... 
doi:10.1109/jphot.2020.3044222 fatcat:ulpu7mp73vh4vefxlsg4smitwu

Application of Image Encryption Algorithm for Wireless Sensor Network in the Security Analysis of Public Big Data

Qiang Geng, Huifeng Yan, Haibin Lv
2022 Wireless Communications and Mobile Computing  
Secondly, based on the chaotic system, the color image encryption algorithm of double chaotic cross-diffusion is built, and the encryption platform is constructed in combination with the current development  ...  The image is highly correlated with adjacent pixels in three directions in the first three channels of encryption.  ...  of time of encryption and decryption. 10 10 Image Encryption Algorithm Based on Double Chaotic Cross-Diffusion.  ... 
doi:10.1155/2022/6186275 fatcat:z77gdkqwmfhb7ocghl5xoxbzwy

Elliptic Curve Blended Cross Chaos Based Secure Image Communication

2019 International journal of recent technology and engineering  
In this project Elliptic Curve Cryptography (ECC) is utilized for generating the keys and the cross chaotic map used for generating the chaotic sequence.  ...  Image encryption has proven a successful method to communicate the confidential information. Some of the images may or may not be confidential. So there is a need to secure the confidential images.  ...  In diffusion phase, a pixel value of the scrambled image is double XORed with the key series of cross chaotic map.  ... 
doi:10.35940/ijrte.c6807.098319 fatcat:guhsmfiadbgkhare33vlybn65a

A Novel Image-Encryption Scheme Based on a Non-Linear Cross-Coupled Hyperchaotic System with the Dynamic Correlation of Plaintext Pixels

Wenjin Hou, Shouliang Li, Jiapeng He, Yide Ma
2020 Entropy  
A hyperchaotic sequence with the same number of image pixels was generated by LF-NCHM, and a novel image-encryption algorithm with permutation that is dynamically related to plaintext pixels was proposed  ...  In the diffusion phase, using the same chaotic sequence as in the scrambling stage increased the usage rate of the hyperchaotic sequence and improved the calculation efficiency of the algorithm.  ...  I also thank the foundation for the research support. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e22070779 pmid:33286550 fatcat:thnzamdgc5fe7a5m3p4oehply4

An Improve Image Encryption Algorithm Based on Multi-level of Chaotic Maps and Lagrange Interpolation

2018 Iraqi Journal of Science  
image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.  ...  Currently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has  ...  [17] was invent new variant of chaotic maps called cross chaotic map ,where two types of chaotic maps used which one dimensional and non-linear dynamic systems ( Logistic, and Chebyshev) has been merged  ... 
doi:10.24996/ijs.2018.59.1a.19 fatcat:7sfqsxkqm5fxhfwx4j2qeqnk74

Image Encryption Based On Diffusion And Multiple Chaotic Maps

G.A Sathishkumar, K Bhoopathy bagan, N Sriraam
2011 International journal of network security and its applications  
In this paper, first, a pair of sub keys is given by using chaotic logistic maps. Second, the image is encrypted using logistic map sub key and in its transformation leads to diffusion process.  ...  The salient features of the proposed image encryption method are loss-less, good peak signal-to-noise ratio (PSNR), Symmetric key encryption, less cross correlation, very large number of secret keys, and  ...  Correlation of Figure 8 .Figure 9 . 89 Cross correlation for different Scanning Patterns(with CSDP) Absolute value of cross correlation (with CSDP & Diffusion process) chaos Maps Logistic Map Tent  ... 
doi:10.5121/ijnsa.2011.3214 fatcat:rkb7s7izrzg2lnzn4qnsqkc72m

Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map

Youxia Dong, Xiaoling Huang, Qixiang Mei, Yuanju Gan, Nanrun Zhou
2021 Security and Communication Networks  
This study proposes a self-adaptive image encryption algorithm based on the quantum logistic map.  ...  Finally, the remaining two random sequences are used to perform forward and reverse diffusion to obtain the final cipher image.  ...  Reference [7] suggested image encryption with two different sets of chaotic maps.  ... 
doi:10.1155/2021/6674948 fatcat:gk2xmr3wsfbu3a4gst437564q4

Multi-Image Encryption Algorithm Based on Cascaded Modulation Chaotic System and Block-Scrambling-Diffusion

Ting Wang, Bin Ge, Chenxing Xia, Gaole Dai
2022 Entropy  
To address the problem of a poor security image encryption algorithm based on a single chaotic map, this paper proposes a cascade modulation chaotic system (CMCS) that can generate multiple chaotic maps  ...  On this basis, a multi-image encryption algorithm with block-scrambling-diffusion is proposed using CMCS.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e24081053 pmid:36010719 pmcid:PMC9407379 fatcat:i7lf4r7olva33glufq4ndsxc6q

A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption

Guo Weichuang, Zhao Junqin, Ye Ruisong
2014 International Journal of Image Graphics and Signal Processing  
The chaotic cat map is utilized to generate chaotic sequences, which are quantized to shuffle the expanded image.  ...  In the permutation process, the image sized MN  is expanded to one sized 2 MN  by dividing the plainimage into two parts: one consisting of the higher 4bits and one consisting of the lower 4bits.  ...  Chaotic natures of the generalized Arnold map with p=5.324, q=18.2.  ... 
doi:10.5815/ijigsp.2014.11.07 fatcat:lwgjt7t4bbedtm5igktve2by3y

Chaotic Image Cryptography Systems: A Review

Amal Hameed Khaleel, Iman Q. Abduljaleel
2021 Samarra Journal of Pure and Applied Science  
Furthermore, it presents a future reading of researches that has a wider role in developing the cryptography field by improving the efficiency of Algorithms where using a chaotic map with other methods  ...  The benefits of chaotic image encryption include the fact that it is simple to implement; it has a faster encryption speed, and it is powerful against attacks.  ...  Chaotic Image Cryptography Systems, 2015 In [20] , a new image encryption method was proposed consisting of both phases of permutation and diffusion using the chaotic map with the cellular automata of  ... 
doi:10.54153/sjpas.2021.v3i2.244 fatcat:ubrzsgc5xzbz5f744ipkvnrqde

Cross Color Field Image Encryption Scheme with Cascade Chaos Systems

Meng JIA
2020 IET Image Processing  
The cross colour field diffusion algorithm makes the encrypted image has little pixel correlation and no information leakage.  ...  In this study, the critical factor of the chaos system has been analysed to improve the randomicity of the encryption keyspace.  ...  Acknowledgments This research jointly supported by the National Nature Science Foundation of China (grant no. 61501391), Nature Science Foundation of Henan Province) (182300410258). References  ... 
doi:10.1049/iet-ipr.2019.0310 fatcat:oyv3tk7vpbh6dpwzxhdpxxdbxu

Review: Image Encryption Techniques based on Chaotic Map

Amal Abdulbaqi Maryoosh, Raniah Ali Mustafa, Zahraa Salah Dhaief
2019 International Journal of Engineering Research and Advanced Technology  
Where many methods were suggested to encrypt images using a chaotic map because their features such as sensitivity to initial conditions and unpredictability of random behaviors etc...  ...  Therefore, there is an increasing interest in the use of encryption and decryption methods.  ...  use cross Chaotic Map for perform the shuffling process after the generating image was separated into a set of blocks. lastly, they obtain to key image was generated through applying square number snails  ... 
doi:10.31695/ijerat.2019.3559 fatcat:huyz2xpis5dqrkm3cqdbcm2kuq

Hybrid Chaotic Encryption Algorithm for Securing DICOM Systems

Ge Jiao
2019 International Journal of Performability Engineering  
Then, we cross-use these two sequences for further image encryption diffusion.  ...  In order to solve the security problem of the DICOM system, we propose a medical image encryption method based on the cross-diffusion of the logistic map and the Chebyshev map.  ...  First, it makes the correlation of adjacent pixels very weak due to the cross-diffusion of the logistic map and Chebyshev map in the encryption process.  ... 
doi:10.23940/ijpe.19.05.p20.14361444 fatcat:m5ddmehavjbxhp3zxtgvnumhba

A New Chaos-Based Cryptosystem for Secure Transmitted Images [article]

Abir Awad
2015 arXiv   pre-print
Then, substitution (confusion) and permutation (diffusion) operations on every block, with multiple rounds, are combined using two perturbed chaotic PWLCM maps.  ...  In the proposed block encryption/decryption algorithm, a 2D chaotic map is used to shuffle the image pixel positions.  ...  For image encryption, two-dimensional (2D) chaotic maps are naturally employed as the image can be considered as a 2D array of pixels.  ... 
arXiv:1503.00366v1 fatcat:uhde43btbvgdxixtotahm5lddm
« Previous Showing results 1 — 15 out of 903 results