A stack-based chaotic algorithm for encryption of colored images
Authors
Abstract:
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four images are respectively pushed into the stack based on next number in the series. In the next step, the first element of the stack (which includes one of the four sub-images) is popped, and this image is divided into four other parts. Then, based on the next number in the series, four sub-images are pushed into the stack again. This procedure is repeated until the stack is empty. Therefore, during this process, each pixel unit is encrypted using another series of chaotic numbers (generated by Chen chaotic system). This method is repeated until all pixels of the plain image are encrypted. Finally, several extensive simulations on well-known USC datasets have been conducted to show the efficiency of this encryption algorithm. The tests performed showthat the proposed method has a really large key space and possesses high-entropic distribution. Consequently, it outperforms the other competing algorithms in the case of security
similar resources
A New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
full textCryptosystem Algorithm Based on Chaotic Systems for Encrypting Colored Images
In this paper, a cryptosystem algorithm based on Chen's and Henon chaotic systems will be introduced and discussed. A proposed cryptosystem algorithm will be designated as CACHS. CACHS meet the requirements of secure image transfer. It will be applied on medium color's frequencies of colored-image. CACHS contains confusion and diffusion algorithms. Confusion algorithm based on Chen's is used to...
full textA Proposed Cryptosystem Algorithm Based on Two Different Chaotic Systems (PCA2CS) for Securing the Colored Images
In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. Chen's chaotic system and Henon chaotic system is used as different chaotic systems to obtain our proposed encryption algorithm; in order to meet the requirements of secure image transfer. The proposed encryption Algorithm will be designated as PCA2CS. It is applied on two different color's fre...
full textEncryption quality measurement of a proposed cryptosystem algorithm for the colored images compared with another algorithm
In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. The proposed cryptosystem algorithm is designated as PCACH. A recently developed encryption algorithm which is designated here, as HuXia is reviewed. These two algorithms are applied to three images of different color frequencies, i.e., different types of colored-images are encrypted with each ...
full textA Summary of image Encryption Algorithm Based on Chaotic Sequence
As a kind of special nonlinear phenomenon, chaos has a series of excellent features such as pseudorandomness, orbit unpredictability, the extreme sensitivity to initial conditions and system parameters, non-repetition of iteration, and so on. Because an increasing number of widely used image and multimedia information has characteristics such as large amount of data and high redundancy, it has ...
full textEnhanced 1-D Chaotic Key-Based Algorithm for Image Encryption
In the past few years, a number of image encryption algorithms based on chaotic maps have been proposed. A recently proposed Chaotic-Key Based Algorithm (CKBA) is based on a one-dimensional Logistic map. However, it has been shown that the current CKBA model is unavoidably susceptible to chosen/known-plaintext attacks, and that the high security claims against ciphertext-only attack were overes...
full textMy Resources
Journal title
volume 5 issue 1
pages 29- 37
publication date 2017-03-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023