Review on 3D Chaotic Map Encryption and Data Hiding Technique
نویسنده
چکیده
Transmission of important data like text, images, video, etc over the internet is increases now days, hence it’s necessary to use of secure methods for multimedia data. Image encryption is most secure than other multimedia components encryption because some inherent properties, such as huge data capacity and high correlation between pixels. The older encryption techniques such as AES, DES, RTS are not suitable for highly secure data transmission on wireless media .Thus we combine the chaotic theory and cryptography to form an valuable technique for information security. In the first stage, a user encrypts the original uncompressed image using chaotic map theory. Then, datahider compresses the least significant bits of the encrypted image using a data-hiding key to make space for accommodate some additional data. In now days image encryption is chaos based for some unique characteristics such as correlation between neighboring pixels, sensitivity to initial conditions, non-periodicity, and control parameters. There are no.of image encryption algorithms based on chaotic maps have been implemented some of them are time consuming, complex and some have very little key space. In this paper we implement three non linier differential chaos based encryption technique where for the first time 3 differential chaos is used for position permutation and value transformation technique. In the data hiding phase, data which is in the the binary forms embedded into encrypted image by using least significant bit algorithm . We tabulate correlation coefficient value both horizontal and vertical position for cipher and original image and compare performance of our Metmod with some existing methods. We also discuss about different types of attack, key sensitivity, and key space of our proposed approach. The given approach is very simple, fast, accurate and it have been applied together as a double algorithm in order to serve best results in highly unsecure and complex environment . Each of these algorithms are been discussed one by one below. Keywords—encryption; correlation; algorithm. __________________________________________________*****_________________________________________________
منابع مشابه
Image encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملImproving Image Encryption Using 3D Cat Map and Turing Machine
Security of data is of prime importance. Security is a very complex and vast topic. One of the common ways to protect this digital data from unauthorized eavesdropping is encryption. This paper introduces an improved image encryption technique based on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The algorithm consists of two main sections: The first d...
متن کاملA New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کاملImproving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملA stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کامل