Selective Encryption of Video Using Multiple Chaotic Maps

Author(s):  
L. M. Varalakshmi ◽  
G. Florence Sudha
2018 ◽  
Vol 8 (10) ◽  
pp. 1963 ◽  
Author(s):  
◽  
Jun Sang ◽  
Muhammad Azeem Akbar ◽  
Bin Cai ◽  
Hong Xiang ◽  
...  

Confidentiality and efficient bandwidth utilization require a combination of compression and encryption of digital images. In this paper, a new method for joint image compression and encryption based on set partitioning in hierarchical trees (SPIHT) with optimized Kd-tree and multiple chaotic maps was proposed. First, the lossless compression and encryption of the original images were performed based on integer wavelet transform (IWT) with SPIHT. Wavelet coefficients undergo diffusions and permutations before encoded through SPIHT. Second, maximum confusion, diffusion and compression of the SPIHT output were performed via the modified Kd-tree, wavelet tree and Huffman coding. Finally, the compressed output was further encrypted with varying parameter logistic maps and modified quadratic chaotic maps. The performance of the proposed technique was evaluated through compression ratio (CR) and peak-signal-to-noise ratio (PSNR), key space and histogram analyses. Moreover, this scheme passes several security tests, such as sensitivity, entropy and differential analysis tests. According to the theoretical analysis and experimental results, the proposed method is more secure and decreases the redundant information of the image more than the existing techniques for hybrid compression and encryption.


2013 ◽  
Vol 13 (2) ◽  
pp. 75-81 ◽  
Author(s):  
Bhagwati Prasad ◽  
Kunti Mishra

Abstract The intent of this paper is to propose an encryption compression scheme using multiple chaotic maps along with the concept of Galois field. This method improves the security of the encrypted data and a significant compression is also achieved. The obtained high security architectures are ideal for many real life applications such as medical images, legal documents and military and other operation


2013 ◽  
Vol 325-326 ◽  
pp. 1502-1507 ◽  
Author(s):  
Xuan Fang ◽  
Cai Qiong ◽  
Lan Fang

Due to the single chaotic map on finite precisions chaotic characteristics emerge degradation,the length of cycle become shorter, the Hash algorithm constructed by it is easily forecast, the security is not strong.In this paper, the nonlinear devices in the traditional block cipher S-box is used to construct variable parameters Hash algorithm composed of multiple chaotic maps. By using the original message, intermediate values of iteration and number of iterations as the input of the S-box, output of S-box is used to determine the parameters of chaotic maps, on this account to change the chaotic mapping function for each round. By execute text testing, statistical analysis and collision analysis for this algorithm through simulation experiments, the experimental results show that this generalized chaotic Hash algorithm has good sensitivity of the information, low possibility of collision,good safety and operational efficiency.


3D Research ◽  
2017 ◽  
Vol 8 (2) ◽  
Author(s):  
Musheer Ahmad ◽  
Shruti Khurana ◽  
Sushmita Singh ◽  
Hamed D. AlSharari

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 52277-52291
Author(s):  
Mujeeb Ur Rehman ◽  
Arslan Shafique ◽  
Sohail Khalid ◽  
Iqtadar Hussain

Author(s):  
Yousif S. Najaf ◽  
Maher K. Mahmood Al-Azawi

Image is one of the most important forms of information. In this paper, two public key encryption systems are proposed to protect images from various attacks. Both systems depend on generating a chaotic matrix (<em>I</em>) using multiple chaotic maps. The parameters for these maps are taken from the shared secret keys generated from Chebyshev map using public keys for Alice and secret key for Bob or vice versa. The second system has the feature of deceiving the third party for searching for fake keys. Analysis and tests showed that the two proposed systems resist various attacks and have very large key space. The results are compared with other chaos based systems to show the superiority of these two proposed systems.


Sign in / Sign up

Export Citation Format

Share Document