Chaotic map technique for enhancement security for android mobile system based on image encryption
نویسندگان
چکیده
Network <span>security continues to be the priority of many organizations. To ensure protection their data, they pay great attention Encryption systems. Moreover, because enormous developments in networks connection particularly internet which has used by several people share a variety data kinds. The security been significant issue. As result, there is focus using methods decryption and encryption. Numerous encryption techniques have become advanced preserve protection, chaotic systems are one these widely recent years, where were proposed use map for encrypt images reason that characteristics e.g., random action unpredictability initial conditions sensitivity. In this paper, proof authentication sent information algorithm provide cipher text hidden image then send another user. This approach applied cellular operating system environment (android). Thus, sending receiving will safe secure. tested on different types mobile. gives good results.</span>
منابع مشابه
Image encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملOn the security of a new image encryption scheme based on chaotic map lattices.
This paper reports a detailed cryptanalysis of a recently proposed encryption scheme based on the logistic map [A. Pisarchik et al., Chaos 16, 033118 (2006)]. Some problems are emphasized concerning the key space definition and the implementation of the cryptosystem using floating-point operations. It is also shown how it is possible to reduce considerably the key space through a ciphertext-onl...
متن کاملCryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map
With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...
متن کاملEnhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of image security has become a major concern and because of this reason, research in image confidentiality has gained popularity amongst security experts. This paper discusses an alternative chaotic image encryption base...
متن کاملA Fast Image Encryption Scheme based on Chaotic Standard Map
In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a ce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v27.i3.pp1698-1703