Image Encryption Technology based on CHAos Theory
نویسندگان
چکیده
منابع مشابه
A Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map
Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...
متن کاملA New Chaos-Based Image Encryption Algorithm
In this paper, we propose a new image encryption algorithm based on the Compound chaotic image encryption algorithm. The original one can’t resist chosen-plaintext attack and has weak statistical security, but our new algorithm can resist the chosen-plaintext attack using a simple improvement solution. The improvement solution is novel and transplantable, it can also be used to enhance the abil...
متن کاملA Modified Chaos-Based Image Encryption Algorithm
Ming Xu* Department of Mathematics and Physics, Shijiazhuang Tiedao University, Shijiazhuang, China. ∗ Corresponding author. Tel: +8613400115751; email: [email protected] Manuscript submitted April 8, 2015; accepted July 5, 2015. doi: 10.17706/jsw.10.8.931-938 Abstract: A modified image encryption algorithm based on the Arnold-Chen chaos image encryption algorithm is presented. The original ...
متن کاملChaos-Based Image Encryption Algorithm Using Decomposition
In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: decomposition, shuffle, diffusion and combination. Decomposition is that an original image is decomposed to components by some rule. Shuffle and diffusion are the essential processions of image encryption. The purpose of the shuffle is to mask original organization of the pixels in images and diffu...
متن کاملReview: Image Encryption Using Chaos Based algorithms
Due to the development in the field of network technology and multimedia applications, every minute thousands of messages which can be text, images, audios, videos are created and transmitted over wireless network. Improper delivery of the message may leads to the leakage of important information. So encryption is used to provide security. In last few years, variety of image encryption algorith...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energy Procedia
سال: 2011
ISSN: 1876-6102
DOI: 10.1016/j.egypro.2011.12.749