89 Hits in 4.6 sec

A Finite Precision Implementation of an Image Encryption Scheme Based on DNA Encoding and Binarized Chaotic Cores

Rania A. Elmanfaloty, Abdullah M. Alnajim, Ehab Abou-Bakr
2021 IEEE Access  
DNA encoding adds an extra layer of security to the algorithm by converting both the image and the chaotic stream to DNA sequences using specific DNA encoding rule.  ...  This paper first discusses the limited periodicity of 1D maps under fixed point precision representation, then, presents an image encryption algorithm based on DNA encoding and two specially configured  ...  Both issues are tackled by implementing a chaotic core comprised of two cross-coupled skew-tent maps as reported in [26] . it was proved that utilizing the cross coupled scheme ensures increasing the  ... 
doi:10.1109/access.2021.3118050 fatcat:rbddyvwhnjgt5itli6z6i646vi

Joint Image Compression and Encryption Using IWT with SPIHT, Kd-Tree and Chaotic Maps

Nasrullah, Jun Sang, Muhammad Azeem Akbar, Bin Cai, Hong Xiang, Haibo Hu
2018 Applied Sciences  
In this paper, a new method for joint image compression and encryption based on set partitioning in hierarchical trees (SPIHT) with optimized Kd-tree and multiple chaotic maps was proposed.  ...  Finally, the compressed output was further encrypted with varying parameter logistic maps and modified quadratic chaotic maps.  ...  In [37] , joint compression and encryption of image data through cross-coupled chaotic maps and Non-uniform Discrete Cosine Transform was proposed.  ... 
doi:10.3390/app8101963 fatcat:ncoukmnn2rhhhb34qkoxhb2sgq

Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences

Liang-Jia Tong, Nan-Run Zhou, Zhi-Jing Huang, Xin-Wen Xie, Ya-Ru Liang, Zhiyuan Tan
2021 Security and Communication Networks  
To enhance the security of the image encryption algorithm, the initial value of the chaotic system is calculated by the 256-bit binary sequence, which is obtained by taking the statistics information of  ...  A nonlinear multi-image encryption scheme is proposed by combining the reality-preserving discrete fractional angular transform with the deoxyribonucleic acid sequence operations.  ...  Reference [62] proposed a multi-grayscale-image encryption scheme in a cross-coupled manner.  ... 
doi:10.1155/2021/6650515 fatcat:vdzr46u7sff77gabzo6bbd5tzi

A Technique for Securing Multiple Digital Images Based on 2D Linear Congruential Generator, Silver Ratio, and Galois Field

Abdul Gaffar, Anand B. Joshi, Sonali Singh, Vishnu Narayan Mishra, Hamurabi Gamboa Rosales, Liang Zhou, Arvind Dhaka, Lakshmi Narayan Mishra
2021 IEEE Access  
INDEX TERMS Digital images, multiple image encryption, 2D Linear Congruential Generator (LCG), silver ratio, Galois field.  ...  than that of the plain (input) images; the authors have used a large number of parameters in the encryption/decryption process, besides the secret key; and the cipher/decipher rounds use the same key  ...  [13] proposed a multiple gray image encryption scheme based on the cross-coupled chaotic maps.  ... 
doi:10.1109/access.2021.3094129 fatcat:zlyk2unfyzaujk52462exo6i5q

Chaotic Image Encryption Algorithm Based on Zigzag Transform with Bidirectional Crossover from Random Position

Hao Gao, Xingyuan Wang
2021 IEEE Access  
INDEX TERMS Chaos, image encryption, zigzag transform, one-dimensional logistic chaotic system, hyperchaotic Chen system.  ...  After multiple rounds of Zigzag transformation, the Logistic system is used to generate a sorted sequence to scramble the image.  ...  In the diffusion stage, multiple rounds of coupling diffusion are used to achieve the purpose of changing the pixel value.  ... 
doi:10.1109/access.2021.3099214 fatcat:6q2bago4tnaojievnxexxdzk2e

A Novel Image-Encryption Scheme Based on a Non-Linear Cross-Coupled Hyperchaotic System with the Dynamic Correlation of Plaintext Pixels

Wenjin Hou, Shouliang Li, Jiapeng He, Yide Ma
2020 Entropy  
Based on a logistic map and Feigenbaum map, we proposed a logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM) model.  ...  Compared with the existing cross-coupled mapping, LF-NCHM demonstrated a wider hyperchaotic range, better ergodicity and richer dynamic behavior.  ...  Non-Linear Cross-Coupled Chaotic Map In 2014, Paral et al. [33] proposed a cross-coupled chaotic map, whose structure is shown in Figure 1 .  ... 
doi:10.3390/e22070779 pmid:33286550 fatcat:thnzamdgc5fe7a5m3p4oehply4

A Hybrid Chaotic Encryption Scheme for Wireless Body Area Networks

Shengwen Fan, Kai Li, Ying Zhang, Honghao Tan, Qiang Fang, Kaining Han, Junchao Wang
2020 IEEE Access  
In this paper, a security scheme based on chaotic mapping for WBAN is proposed.  ...  This algorithm makes use of the hybrid chaotic system obtained by the combination of Logistic and Tent mapping as the sequence generator, which can select the effective precision according to the importance  ...  An algorithm for generating binary sequences using enhanced cross-coupled skew mapping is proposed in paper [25] .  ... 
doi:10.1109/access.2020.3029263 fatcat:wzg6ckdhjbfchbygpfon2acf6e

A Non-adaptive Partial Encryption of Grayscale Images based on Chaos

Sukalyan Som, Sayani Sen
2013 Procedia Technology - Elsevier  
We decompose the original grayscale image into its corresponding binary eight bit planes then encrypted using couple tent map based pseudorandom binary number generator (PRBNG).  ...  In this paper, A Non-adaptive Partial Encryption of Grayscale Images Based on Chaoshas been proposed. In Partial encryption speed and time is the main factor.  ...  For image encryption a symmetric key cryptography multiplicative cipher is used. Similarly for compression Discrete Cosine Transform is used.  ... 
doi:10.1016/j.protcy.2013.12.408 fatcat:jnlkhdzqr5altkm25i44qcx3dm

Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption

Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li, Sichun Du
2020 Complexity  
In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image.  ...  Through the evaluation of encryption performance, it is concluded that there is no direct relationship between the pristine image and encrypted image.  ...  In [51] , a random bitstream is generated by comparing piecewise linear chaotic maps consisting of cross-coupled two Tent maps.  ... 
doi:10.1155/2020/8274685 doaj:01cde497046545768ab094a85b135960 fatcat:3e7h5cjcxjhotcwv2d4vqy5jwa

Chaotic Lightweight Cryptosystem for Image Encryption

Jannatul Ferdush, Mahbuba Begum, Mohammad Shorif Uddin, Patrick Seeling
2021 Advances in Multimedia  
At first, we have presented a standard framework and algorithm based on two chaotic maps such as Arnold and logistic for lightweight image encryption and performed some experiments.  ...  In this study, we have studied the chaotic-based lightweight image encryption method.  ...  [39] proposed a multiple-image encryption method based on cross-coupled chaotic maps. But the system is not tested for color images.  ... 
doi:10.1155/2021/5527295 fatcat:csmkkzixtnbkndiqvr35rlm2su

Secret Image Sharing Scheme Based on Pixel Segmentation Strategy Exploiting Modification Direction (PSSEMD) with High Quality Shadows

2019 International journal of recent technology and engineering  
Here Lossless image compression is done with the concern of sensitive information. Then chaotic encryption and decryption method is used for better security during image sharing process.  ...  Pixel Segmentation Strategy EMD (PSSEMD) Method is used for wrapping confidential bit on all pixel cover image. the images as secret and cover are rebuilt by Shadow images.  ...  Logistic map is widely popular and used as (9) The Logistic sequence of probability density function is represented as (10) The encryption algorithm can be described as follows: Step1. a chaotic systems  ... 
doi:10.35940/ijrte.d5329.118419 fatcat:ukhbcejchrc2fghdsm6lu2x2wa

Novel Scheme for Image Encryption Combining 2D Logistic-Sine-Cosine Map and Double Random-Phase Encoding

Huiqing Huang
2019 IEEE Access  
INDEX TERMS Image encryption, 2D logistic map, double random-phase encoding, discrete wavelet transform.  ...  Performance analysis shows that it has larger chaotic range, bigger Lyapunov exponent and more complex chaotic behavior than the classical 2D Logistic map.  ...  In [23] , using the advantage of the chaotic intertwining logistic map and its unpredictability, a new cipher with pre-modular, permutation and diffusion is designed for image encryption chaotic intertwining  ... 
doi:10.1109/access.2019.2958319 fatcat:luer5t2jzbfy7lkk76hdv355vm

Review of Image Compression and Encryption Techniques

Emy Setyaningsih, Retantyo Wardoyo
2017 International Journal of Advanced Computer Science and Applications  
The first category, i.e. cryptographic technique followed by compression method, focuses more on image security than the reduction of a size of data.  ...  In line with a growing need for data and information transmission in a safe and quick manner, researches on image protection and security through a combination of cryptographic and compression techniques  ...  A new chaotic map is recommended based on Devaney theory, which works as a local map of NCML called system spatiotemporal cross chaotic.  ... 
doi:10.14569/ijacsa.2017.080212 fatcat:7ct6ex2c55aynjv2jsby2fp7bi

A Novel Parallelizable Chaotic Image Encryption Scheme based on Elliptic Curves

Alaa M. Abbas, Ayman A. Alharbi, Saleh Ibrahim
2021 IEEE Access  
Numerous chaotic maps have been proposed in the literature and used in image encryption schemes.  ...  Song, "2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image Encryption," IEEE Access, vol. 7, pp. 14081-14098, 2019. [5] Z. Hua, Y. Zhou, and H.  ... 
doi:10.1109/access.2021.3068931 fatcat:aspejfwegfbndpu5pdarh63l5m

Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm

Kaixin Jiao, Guodong Ye, Youxia Dong, Xiaoling Huang, Jianqing He
2020 Security and Communication Networks  
This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest–Shamir–Adleman (RSA) algorithm.  ...  First, the parameters of the generalized Arnold map are generated by an asymmetric encryption-system RSA algorithm, and the keystream is produced iteratively.  ...  [35] used the generated cosine transform chaotic map to further propose an image encryption scheme. e generated chaotic map exhibits more complicated chaotic behavior than the existing chaotic map.  ... 
doi:10.1155/2020/9721675 fatcat:sgzzuvxgzvaafmkgjbinkwxdwy
« Previous Showing results 1 — 15 out of 89 results