Application of Chaotic Maps for B-Spline functions to Robust Image Cryptography
نویسندگان
چکیده
Image encryption is one of most useful way of securing image data. Traditional data security algorithms are also used over images but due to the bulkiness of image data they are not useful. Chaotic sequences play a very good role in image cryptographic system, due to their high sensitivity to initial condition and other properties. In this paper, B-spline functions of first three orders are studied, explored for their chaotic nature and used for image encryption. The experimental results show the proposed approach is useful for encrypting images using the B-Spline functions as chaotic maps. A subjective analysis shows B-spline Map of first order gives good unintelligible encrypted images.
منابع مشابه
Watermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملA novel algorithm for image encryption based on mixture of chaotic maps
Chaos-based encryption appeared recently in the early 1990s as an original application of nonlinear dynamics in the chaotic regime. In this paper, an implementation of digital image encryption scheme based on the mixture of chaotic systems is reported. The chaotic cryptography technique used in this paper is a symmetric key cryptography. In this algorithm, a typical coupled map was mixed with a...
متن کاملA Robust Chaotic and Fast Walsh Transform Encryption for Gray Scale Biomedical Image Transmission
In this work, a new scheme of image encryption based on chaos and Fast Walsh Transform (FWT) has been proposed. We used two chaotic logistic maps and combined chaotic encryption methods to the two-dimensional FWT of images. The encryption process involves two steps: firstly, chaotic sequences generated by the chaotic logistic maps are used to permute and mask the intermediate results or array o...
متن کاملA Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps
The chaos based cryptographic algorithms have suggested several advantages over the traditional encryption algorithms such as high security, speed, reasonable computational overheads and computational power. This paper introduces an efficient chaos-based stream cipher, composing two chaotic logistic maps and a large enough external secret key for image encryption. The external secret key is use...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کامل