Novel Secured Image Scrambling Technique Using Chaotic Sequence Shuffling and Pixel Value Modification Through Random Grid Map and Its Performance Analysis

Author(s):  
Rama Kishore Reddlapalli ◽  
Sunesh Malik
Author(s):  
Prajwalasimha S. N. ◽  
Basavaraj L

<span lang="EN-US">In this article, a combined Pseudo Hadamard transformation and modified Bogdonav chaotic generator based image encryption technique is proposed. Pixel position transformation is performed using Pseudo Hadamard transformation and pixel value variation is made using Bogdonav chaotic substitution. Bogdonav chaotic generator produces random sequences and it is observed that very less correlation between the adjacent elements in the sequence. The cipher image obtained from the transformation stage is subjected for substitution using Bogdonav chaotic sequence to break correlation between adjacent pixels. The cipher image is subjected for various security tests under noisy conditions and very high degree of similarity is observed after deciphering process between original and decrypted images.</span>


Strain ◽  
2010 ◽  
Vol 48 (1) ◽  
pp. 1-15 ◽  
Author(s):  
A. P. Iliopoulos ◽  
J. G. Michopoulos ◽  
N. P. Andrianopoulos

2011 ◽  
Vol 135-136 ◽  
pp. 231-236
Author(s):  
Rui Liu ◽  
Xiao Ping Tian

Image scrambling is an important technique in digital image encryption and digital image watermarking. This paper proposes a new image scrambling method, which based on chaotic sequence and space-bit-plane operation (SBPO). First, every eight pixels from different areas of image were selected according to chaotic sequence, and grouped together to form a collection. Second, the SBPO was performed in every collection and built eight pixels of the image with new values. The scrambling image was generated when all pixels were processed. This method can scramble image not only based on the pixel’s position but also the value and their corresponding probability. The experimental results show that this scrambling method possesses perfect confusion properties and it can resist various attacks.


Sign in / Sign up

Export Citation Format

Share Document