Design of an Images Security System
2010 ◽
Vol 34-35
◽
pp. 1735-1738
Keyword(s):
The paper designs an image security system. It includes four parts: keys generation, permutation, diffusion and decryption. Using six decimal numbers as the key, it can get three new keys: key1, key2 and key3 from the origin key in keys generation. The permutation used a new chaotic map to shuffles the image pixels by key1 and key2. The diffusion used the logistic map to flat the histogram of the ciphered image. The key3 is the parameters of the logistic map. The results of simulation show the validity of security system. Analysis shows that it can be used in real-time image encryption applications with high speed.
1998 ◽
Vol 134
(1)
◽
pp. 138-141
◽
Keyword(s):
2018 ◽
Vol 16
(3)
◽
pp. 775-790
◽
2015 ◽
Vol 27
(1)
◽
pp. 12-23
◽
Keyword(s):
2012 ◽
Vol 2012
(0)
◽
pp. _2P1-K04_1-_2P1-K04_2
2014 ◽
Vol 971-973
◽
pp. 1454-1458
Keyword(s):
2005 ◽
Vol 17
(4)
◽
pp. 420-427
◽
Keyword(s):
1994 ◽
Vol 31
(10)
◽
pp. 711-718
◽
Keyword(s):
Keyword(s):