A Joint SVD based Watermarking and Encryption Scheme using Chaotic Logistic Map
نویسندگان
چکیده
منابع مشابه
A Joint SVD based Watermarking and Encryption Scheme using Chaotic Logistic Map
Copyright protection and secrecy of some sensitive data is essential in this present digital era which deals with the advances in cloud computing and big data analytics. Digital watermarking is a popular method for copyright protection whereas cryptography takes care in hiding information as well as for secure transmission of data in a manner that is unreadable to a third party. Combination of ...
متن کاملImage encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication,wepropose a newapproach for image encryption basedon chaotic logisticmaps in order tomeet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic ...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملA New Encryption Method Using Chaotic Logistic Map
Encryption is to rearrange the message into difference form so that the message is keep secret. The goal of encryption is to provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key and difficult and expensive means to estimate the plain text without use of the key Nowadays the Internet becomes popular and encryption technol...
متن کاملChaotic Encryption Scheme Using 1-D Chaotic Map
This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using vario...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ECTI Transactions on Computer and Information Technology (ECTI-CIT)
سال: 1970
ISSN: 2286-9131,2286-9131
DOI: 10.37936/ecti-cit.201592.54413