Color Image Encryption using Hyper Chaos Chen
نویسندگان
چکیده
منابع مشابه
An Inter-Component Pixels Permutation Based Color Image Encryption Using Hyper-chaos
In this paper, a simple and robust color image encryption algorithm based on highdimensional chaotic maps is proposed. The algorithm employs a 3D Arnold transform to perform inter-component shuffling of plain-image, while a 2D hyper-chaotic map is used to confuse the relationship between the encrypted image and plain-image. The control parameters of Arnold transform are extracted from pending p...
متن کاملImprovement of an image encryption algorithm based on hyper-chaos
In this paper, we propose to enhance a recently proposed image cryptosystem based on hyper-chaos. The updated version has been builded to resist against attacks made to break the original one and to make it faster. The modification touch on the two Boxes, P-Box and S-Box, which composed the original cryptosystem. Compared with classical encryption scheme, AES and Triple-DES, the new version of ...
متن کاملA new image encryption algorithm based on hyper-chaos
This Letter presents a new image encryption scheme, which employs an image total shuffling matrix to shuffle the positions of image pixels and then uses a hyper-chaotic system to confuse the relationship between the plain-image and the cipher-image. The experimental results demonstrate that the suggested encryption algorithm of image has the advantages of large key space and high security, and ...
متن کاملSecuring the Information Using Hyper-chaos Encryption Algorithm
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all...
متن کاملChaos Image Encryption using Pixel shuffling
The advent of wireless communications, both inside and outside the home-office environment has led to an increased demand for effective encryption systems. The beauty of encryption technology comes out in more pronounced way when there is no absolute relation between cipher and original data and it is possible to rebuild the original image in much easier way. As chaotic systems are known to be ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/19303-0752