Chaotic map technique for enhancement security for android mobile system based on image encryption

نویسندگان

چکیده

Network <span>security continues to be the priority of many organizations. To ensure protection their data, they pay great attention Encryption systems. Moreover, because enormous developments in networks connection particularly internet which has used by several people share a variety data kinds. The security been significant issue. As result, there is focus using methods decryption and encryption. Numerous encryption techniques have become advanced preserve protection, chaotic systems are one these widely recent years, where were proposed use map for encrypt images reason that characteristics e.g., random action unpredictability initial conditions sensitivity. In this paper, proof authentication sent information algorithm provide cipher text hidden image then send another user. This approach applied cellular operating system environment (android). Thus, sending receiving will safe secure. tested on different types mobile. gives good results.</span>

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

On the security of a new image encryption scheme based on chaotic map lattices.

This paper reports a detailed cryptanalysis of a recently proposed encryption scheme based on the logistic map [A. Pisarchik et al., Chaos 16, 033118 (2006)]. Some problems are emphasized concerning the key space definition and the implementation of the cryptosystem using floating-point operations. It is also shown how it is possible to reduce considerably the key space through a ciphertext-onl...

متن کامل

Cryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map

With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...

متن کامل

Enhanced chaotic image encryption algorithm based on Baker's map

Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of image security has become a major concern and because of this reason, research in image confidentiality has gained popularity amongst security experts. This paper discusses an alternative chaotic image encryption base...

متن کامل

A Fast Image Encryption Scheme based on Chaotic Standard Map

In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a ce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2022

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v27.i3.pp1698-1703