Partial Image Encryption using Peter De Jong Chaotic Map based Bit-Plane Permutation and it’s Performance Analysis

نویسندگان

  • Monjul Saikia
  • Nitumoni Hazarika
  • Margaret Kathing
چکیده

Today among various medium of data transmission or storage our sensitive data are not secured with a third-party, that we used to take help of. Cryptography plays an important role in securing our data from malicious attack. This paper present a partial image encryption based on bit-planes permutation using Peter De Jong chaotic map for secure image transmission and storage. The proposed partial image encryption is a raw data encryption method where bits of some bit-planes are shuffled among other bit-planes based on chaotic maps proposed by Peter De Jong. By using the chaotic behavior of the Peter De Jong map the position of all the bit-planes are permuted. The result of the several experimental, correlation analysis and sensitivity test shows that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and decryption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

An FPGA Implementation of Chaos based Image Encryption and its Performance Analysis

Today, hardware chip design with FPGA implementation for designing secure crypto processor is a growing topic due to rapidly increasing attack on digital images over internet network. In this paper, an FPGA implementation of Chaotic Map based two phase image encryption technique is proposed. First phase consists of pixel position permutation and second phase consists of bit value position permu...

متن کامل

Chaotic image encryption using modular addition and combinatorial techniques

The image encryption is widely used to secure transmission of data in an open internet and internet works. For image based cryptosystems chaotic maps can be used as a key because of its nonlinear component. Due to sensitivity to initial conditions, chaotic maps have best alternative for designing dynamic permutation of the image based cryptosystem. A chaotic map is used to generate permutation ...

متن کامل

A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption

A great many chaos-based image encryption schemes have been proposed in the past decades. Most of them use the permutation-diffusion architecture in pixel level, which has been proved insecure enough as they are not dependent on plain-images and so cannot resist chosen/known plain-image attack usually. In this paper, we propose a novel image encryption scheme comprising of one permutation proce...

متن کامل

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

With the advancement of multimedia and real-time networks, a vast number of digital images are now stored and transmitted over public networks. A lot of researches of chaos-based image encryption technologies have been done. However, the performance of conventional encryption algorithm is not satisfying when used to color image. In this paper, we propose an improved chaos-based color image cryp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014