A New Method for Encryption of Color Images based on Combination of Chaotic Systems

Authors

  • A. Zandvakili Department of Computer Engineering, Jiroft Branch, Islamic Azad University, Jiroft, Iran.
  • H. Khodadadi Department of Computer Engineering, Minab Branch, Islamic Azad University, Minab, Iran.
Abstract:

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from 0 to 10. The three red, green, and blue values were combined with three values of the first Chen system to encrypt pixel 1 of the image while values of the second Chen system were used to distort the combination order of the values of the first Chen system with the pixels of the image. The process was repeated until all pixels of the image were encrypted. The innovative aspect of this method was in combination of the two chaotic systems, which makes the encryption process more complicated. Tests performed on standard images (USC datasets) indicated effectiveness and robustness of this encryption method

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

full text

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

A New Image Encryption Scheme for Secure Digital Images Based on Combination of Polynomial Chaotic Maps

In recent times, research on image encryption using chaotic systems has emerged. However, some of the proposed schemes still hinder the system performance and security. In this study, we introduce an efficient image encryption scheme based on pixel bit and combination of polynomial chaotic maps with variable initial parameters. The algorithm takes advantage of the best features of chaotic maps ...

full text

A New Method for Eye Detection in Color Images

The problem of eye detection in face images is very important for a large number of applications ranging from face recognition to gaze tracking. In this paper we propose a new algorithm for eyes detection. First, the face region is extracted from the image by skin-color information. Second, horizontal projection in image is used to approximate region of the eye be obtained . At last, the eye ce...

full text

application of upfc based on svpwm for power quality improvement

در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...

15 صفحه اول

A New Method for Eye Detection in Color Images

The problem of eye detection in face images is very important for a large number of applications ranging from face recognition to gaze tracking. In this paper we propose a new algorithm for eyes detection. First, the face region is extracted from the image by skin-color information. Second, horizontal projection in image is used to approximate region of the eye be obtained . At last, the eye ce...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 7  issue 3

pages  377- 383

publication date 2019-07-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023