Review of Joint Encoding and Encryption for Image Transmission using Chaotic Map, LDPC and AES Encryption

Author(s):  
Kanchan Yadav ◽  
Trushita Chaware
2019 ◽  
Vol 1 ◽  
pp. 162-175
Author(s):  
Terlumun Gbaden

In recent years, great concerns have been raised regarding the issue of digital image protection due to the increasing demand for security services. To meet this challenge, a novel chaos-based approach is suggested in this paper. To address the security and efficiency problems encountered by many existing permutation-diffusion type image ciphers the new scheme utilizes Aizawa chaotic map which enhances the security against known/chosen –plaintext attack. Experimental tests were carried out and the results indicate that the proposed scheme provides an effective and efficient way for real-time secure digital image transmission over unsecured networks.


2019 ◽  
Vol 8 (S1) ◽  
pp. 70-73
Author(s):  
P. Sridevi ◽  
J. Suguna

Nowadays transmission of data over the network is increasing and the data can be in the format of text, image, audio and video. Images are widely used in maximum applications of daily life. Image encryption is one of the most recent area of research to meet the demand during image transmission. Transformation of image from one form to erroneous form is called as image encryption. So, it can be secured from unauthorized users. The security of encrypted image is completely dependent on two important aspects i.e. the strength of the cryptographic algorithm and the confidentiality of the key. This paper proposes an algorithm of image encryption based on 3D Arnold cat map combined with logistic chaotic map. To evaluate the security of the encrypted image of this scheme, key space analysis and differential attack are performed. Several test images are used to demonstrate the validity of the proposed encryption algorithm. The experiment result shows that the proposed algorithm provides an efficient and secure approach to real-time image encryption and transmission.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-18
Author(s):  
Jiayin Yu ◽  
Yaqin Xie ◽  
Shiyu Guo ◽  
Yanqi Zhou ◽  
Erfu Wang

With the rapid development of information technology in today’s society, the security of transmission and the storage capacity of hardware are increasingly required in the process of image transmission. Compressed sensing technology can achieve data sampling and compression at the rate far lower than that of the Nyquist sampling theorem and can effectively improve the efficiency of information transmission. Aiming at the problem of weak security of compressed sensing, this study combines the cryptographic characteristics of chaotic systems with compressed sensing technology. In the actual research process, the existing image encryption technology needs to be applied to the hardware. This paper focuses on the combination of image encryption based on compressed sensing and digital logic circuits. We propose a novel technology of parallel image encryption based on a sequence generator. It uses a three-dimensional chaotic map with multiple stability to generate a measurement matrix. This study also analyzes the effectiveness, reliability, and security of the parallel encryption algorithm for source noise pollution with different distribution characteristics. Simulation results show that parallel encryption technology can effectively improve the efficiency of information transmission and greatly enhance its security through key space expansion.


Author(s):  
Vinod K. Berry ◽  
Xiao Zhang

In recent years it became apparent that we needed to improve productivity and efficiency in the Microscopy Laboratories in GE Plastics. It was realized that digital image acquisition, archiving, processing, analysis, and transmission over a network would be the best way to achieve this goal. Also, the capabilities of quantitative image analysis, image transmission etc. available with this approach would help us to increase our efficiency. Although the advantages of digital image acquisition, processing, archiving, etc. have been described and are being practiced in many SEM, laboratories, they have not been generally applied in microscopy laboratories (TEM, Optical, SEM and others) and impact on increased productivity has not been yet exploited as well.In order to attain our objective we have acquired a SEMICAPS imaging workstation for each of the GE Plastic sites in the United States. We have integrated the workstation with the microscopes and their peripherals as shown in Figure 1.


1992 ◽  
Vol 139 (5) ◽  
pp. 495 ◽  
Author(s):  
Q. Mongatti ◽  
L. Alparone ◽  
G. Benelli ◽  
S. Baronti ◽  
F. Lotti ◽  
...  

2014 ◽  
Vol 2014 (1) ◽  
pp. 34-42 ◽  
Author(s):  
N. S. Raghava ◽  
◽  
Ashish Kumar ◽  
Aishwarya Deep ◽  
Abhilasha Chahal ◽  
...  

2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


Sign in / Sign up

Export Citation Format

Share Document