Image Encryption Using Chaotic Maps of Various Dimensions: Review
نویسندگان
چکیده
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of data via insecure channel like internet. The available encryption algorithms which are mainly used for textual data maynot be suitable for multimedia data like images. Image encryption can be done in different ways. Most of the encryption techniques have some security and performance issues. Nowadays many algorithms related to image encryption based on the chaotic method have been put forward to improve security during transmission of images. Chaos based encryption systems are mostly used because of their better performance and certain features like sensitivity to initial conditions, state ergodicity, randomness etc. The confusion and diffusion in image is increased using chaos. Chaotic maps have several advantages like enormous key space and high security. In order to reach higher performance, these chaotic based methods take advantage of the more and more complex behavior of chaotic signals. There are different dimensions of chaotic maps used for chaotic encryption like one dimensional, multidimensional and cascade chaotic system. The performance of each systems is determined by the statistical and security analysis. This work is a review of chaos based image encryption algorithms using chaotic maps of different dimensions.
منابع مشابه
Image encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملA stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملA New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کاملA new 1D chaotic system for image encryption
This paper introduces a simple and effective chaotic system using a combination of two existing one-dimension (1D) chaotic maps (seed maps). Simulations and performance evaluations show that the proposed system is able to produce many 1D chaotic maps with larger chaotic ranges and better chaotic behaviors compared with their seed maps. To investigate its applications in multimedia security, a n...
متن کاملImage Encryption Based on Diffusion and Multiple Chaotic Maps
In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness. This paper presents a new algorithm for the image encryption/decryption scheme. This paper is devoted to provide a secured image encryption techni...
متن کامل