Digital image encryption based on chaotic map for secure transmission

Author(s):  
M. Ahmad ◽  
C. Gupta ◽  
A. Varshney
2011 ◽  
Vol 20 (4) ◽  
pp. 040506 ◽  
Author(s):  
Fu-Yan Sun ◽  
Zong-Wang Lü

2014 ◽  
Vol 7 (4) ◽  
pp. 65 ◽  
Author(s):  
Obaida M. Al-hazaimeh

In this paper, an implementation of digital image encryption scheme based on one dimensional logistic map is proposed. The chaotic cryptography technique concentrates in general on the symmetric key cryptographic technique. In the proposed algorithm, a random key table lookup criterion was combined with a one-dimensional chaotic map were used for high degree 2-stage security image encryption while maintaining acceptable overhead delay time. The proposed algorithm is based on image row shuffling and pixel-wise XOR encryption. To increase the security of row shuffling variable rotation and inversion were applied to each shuffled row, based on the difference between old and new row location. The experimental results showed that the proposed algorithm is effective and applicable. The combination of logistic map and key table lookup shows advantages of large random key space and high-level of security. The resulting cipher image is suitable for practical use in secure image storing and transmission.


2021 ◽  
Vol 55 (5) ◽  
pp. 490-499
Author(s):  
Zhong-xun Wang ◽  
Kai-yue Sha ◽  
Xing-long Gao

2017 ◽  
Vol 893 ◽  
pp. 012050 ◽  
Author(s):  
MT Suryadi ◽  
Maria Yus Trinity Irsan ◽  
Yudi Satria

2018 ◽  
Vol 2 (2) ◽  
pp. 175-195
Author(s):  
Raghad Yousif ◽  
Ayad Ismaeel

This paper presents a novel image encryption scheme based on extended largescale randomization key-stream generator. The basic form of the key-stream generator is presented, and employed in digital image ciphering. The modification of the basic form also, presented, and gives encouraging results in image encryption as compared with classical non-linear stream cipher generators and the basic form. Pixel shuffling is performed via vertical and horizontal permutation. Shuffling is used to expand diffusion in the image and dissipate high correlation among image pixels the sequences generated from all presented generators are introduced to five well-known statistical tests of randomness to judge their randomness characteristic. The ciphered images are tested for their residual intelligibility subjectively. The measures applied to images ciphered by one of the classical key-stream cipher generators (Threshold generator) for the purpose of comparison with the presented key-stream algorithms. Experiments results show that the proposed algorithm achieves the image security. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the proposed scheme shows a good resistance against brute-force and statistical attacks


Sign in / Sign up

Export Citation Format

Share Document