scholarly journals A Framework for Digital Image Encryption using Chaotic Baker Map with SHA Algorithm

Recently, security for the image is becoming very important. Image Encryption is the only choice in protecting the digital image by transforming the image into an unreadable format. There are many methods used to protect against unauthorized access. This research proposes a framework for image encryption using Chaos Baker map with SHA-1 algorithm. The Chaotic Baker map is a randomization technique used to make the pixels more shuffled. Key generation is essential part of image encryption, which will be carried out by SHA-1 algorithm. Experimental results show that the proposed method is well suited for high security, key sensitivity and resists various attacks.

2020 ◽  
Vol 17 (5) ◽  
pp. 2130-2135
Author(s):  
S. Saravanan ◽  
M. Sivabalakrishnan

In this paper, we propose a new image encryption method based on Chaos Baker map and Lanczos algorithm. Two levels of security are achieved to enhance the level of image security. In the first level, the Chaotic Baker map is a randomization technique used to make the pixels more shuffled. A pseudo-random generator is used with the second-level Lanczos algorithm which is applied to generate eigenvalues and eigenvectors. The proposed method resists various attacks: plaintext attacks, maximum deviation, correlation analysis and key sensitivity. Experimental results show that this method has better time complexity when protecting images.


2011 ◽  
Vol 135-136 ◽  
pp. 231-236
Author(s):  
Rui Liu ◽  
Xiao Ping Tian

Image scrambling is an important technique in digital image encryption and digital image watermarking. This paper proposes a new image scrambling method, which based on chaotic sequence and space-bit-plane operation (SBPO). First, every eight pixels from different areas of image were selected according to chaotic sequence, and grouped together to form a collection. Second, the SBPO was performed in every collection and built eight pixels of the image with new values. The scrambling image was generated when all pixels were processed. This method can scramble image not only based on the pixel’s position but also the value and their corresponding probability. The experimental results show that this scrambling method possesses perfect confusion properties and it can resist various attacks.


2021 ◽  
Vol 55 (5) ◽  
pp. 490-499
Author(s):  
Zhong-xun Wang ◽  
Kai-yue Sha ◽  
Xing-long Gao

2017 ◽  
Vol 893 ◽  
pp. 012050 ◽  
Author(s):  
MT Suryadi ◽  
Maria Yus Trinity Irsan ◽  
Yudi Satria

2018 ◽  
Vol 2 (2) ◽  
pp. 175-195
Author(s):  
Raghad Yousif ◽  
Ayad Ismaeel

This paper presents a novel image encryption scheme based on extended largescale randomization key-stream generator. The basic form of the key-stream generator is presented, and employed in digital image ciphering. The modification of the basic form also, presented, and gives encouraging results in image encryption as compared with classical non-linear stream cipher generators and the basic form. Pixel shuffling is performed via vertical and horizontal permutation. Shuffling is used to expand diffusion in the image and dissipate high correlation among image pixels the sequences generated from all presented generators are introduced to five well-known statistical tests of randomness to judge their randomness characteristic. The ciphered images are tested for their residual intelligibility subjectively. The measures applied to images ciphered by one of the classical key-stream cipher generators (Threshold generator) for the purpose of comparison with the presented key-stream algorithms. Experiments results show that the proposed algorithm achieves the image security. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the proposed scheme shows a good resistance against brute-force and statistical attacks


Sign in / Sign up

Export Citation Format

Share Document