A Joint SVD based Watermarking and Encryption Scheme using Chaotic Logistic Map

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Joint SVD based Watermarking and Encryption Scheme using Chaotic Logistic Map

Copyright protection and secrecy of some sensitive data is essential in this present digital era which deals with the advances in cloud computing and big data analytics. Digital watermarking is a popular method for copyright protection whereas cryptography takes care in hiding information as well as for secure transmission of data in a manner that is unreadable to a third party. Combination of ...

متن کامل

Image encryption using chaotic logistic map

In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication,wepropose a newapproach for image encryption basedon chaotic logisticmaps in order tomeet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic ...

متن کامل

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

A New Encryption Method Using Chaotic Logistic Map

Encryption is to rearrange the message into difference form so that the message is keep secret. The goal of encryption is to provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key and difficult and expensive means to estimate the plain text without use of the key Nowadays the Internet becomes popular and encryption technol...

متن کامل

Chaotic Encryption Scheme Using 1-D Chaotic Map

This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using vario...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ECTI Transactions on Computer and Information Technology (ECTI-CIT)

سال: 1970

ISSN: 2286-9131,2286-9131

DOI: 10.37936/ecti-cit.201592.54413