In the recent decade, chaos-based image encryption algorithms gained attention due to their pros and cons. The authors suggest one such algorithm of image encryption for different colour space using feed forward initi...
详细信息
In the recent decade, chaos-based image encryption algorithms gained attention due to their pros and cons. The authors suggest one such algorithm of image encryption for different colour space using feed forward initial condition to pursue random permutation by combining 1d logistic map with a series of tent maps. The algorithm adds one more novel step to protect and encrypt binary image by concealing it within a cover grey image using bit-plane decomposition methods. Sensitivity towards initial condition is shown using block division of image by applying a stream of random initial conditions to each block for encryption along with XOR operation which leads the key space high (similar or equal to 2(484)). For better performance analysis, the proposed scheme has been tested with many colour space images including a binary image. The proposed technique is more efficient with respect to time complexity and resistance to vulnerability aspects.
Chaotic audio encryption anddecryption using the logisticmap offer a promising avenue for enhancing the security of audio data through the utilization of chaotic dynamics and non-linear cryptography techniques. This...
详细信息
ISBN:
(数字)9798350372106
ISBN:
(纸本)9798350372113;9798350372106
Chaotic audio encryption anddecryption using the logisticmap offer a promising avenue for enhancing the security of audio data through the utilization of chaotic dynamics and non-linear cryptography techniques. This paper uses the SHA 256 algorithm, a secure hashing algorithm that provides 256 bits (32 bytes of string) followed by a 3dlogisticmap, which is the encryption process. The end has a high-security 1d logistic map used for the output of the 3dmap. discrete Wavelet Transform (dWT) and Inverse discrete Wavelet Transform (IdWT) are introduced to increase the timing efficiency of the process. As a result, for the proposed method, the peak signal-to-noise ratio (PSNR), correlation, time required for encryption anddecryption, histogram, and spectrogram of input, encrypted anddecrypted various audio signals have been measured and tabulated for performance analysis. The analysis shows that the proposed methodology works appropriately and efficiently.
in this communication, a Chaos Based Symmetric Key Encryption of RGB Color Images with dNA Coding and a Chaos based Pseudorandom Binary Number Generator (PRBNG) has been proposed. In the proposed algorithm, the plain ...
详细信息
ISBN:
(纸本)9781467352499
in this communication, a Chaos Based Symmetric Key Encryption of RGB Color Images with dNA Coding and a Chaos based Pseudorandom Binary Number Generator (PRBNG) has been proposed. In the proposed algorithm, the plain image is first scrambled using generalized Arnold Cat map to achieve confusion. The scrambled image pixel are converted to dNA codes and again reconverted to integers where the choice of dNA coding rule is made pseudorandom based on the binary sequences generated by chaos based pseudorandom binary number generator. The integers thus obtained are diffused by performing exclusive OR operation with the integer sequences generated by 1d logistic map producing the cipher image. The experimental results depicts that the proposed algorithm can successfully encrypt anddecrypt RGB color images with secret keys. The simulation analysis also exhibit that the proposed method is loss-less, secure and efficient measured in terms of statistical tests(like histogram analysis, correlation coefficient analysis, measures of central tendency anddispersion), key sensitivity test, key space analysis, information entropy test, encryption quality by MSE, PSNR, NPCR and UACI.
Ciphereddata need an additional level of protection in order to safeguard them from being tampered after the decryption phase. Ciphereddata, upon being deciphered by the intended receiver, is unprotected and it can ...
详细信息
ISBN:
(纸本)9788132222507;9788132222491
Ciphereddata need an additional level of protection in order to safeguard them from being tampered after the decryption phase. Ciphereddata, upon being deciphered by the intended receiver, is unprotected and it can be easily doctored by ever-developing, sophisticated image processing softwares. In the proposed scheme, we introduce a selective bitplane based encryption of grayscale images coupled with the facility of tamper detection, localization and restoration based on dWT baseddigital watermark. The original image is first sub-divided into blocks where discrete Wavelet Transform (dWT) is applied to generate the watermark. This is embedded in four disjoint portions of the image to increase the probability of restoration of the tampered image from tampers. To add another level of security to the transmission of the watermarked image a selective bitplane based encryption based on chaos is applied. The watermarked image is first partitioned into its constituent bitplanes and then first four bitplanes from Most Significant Bitplane (MSB) is encrypted by a chaos based pseudorandom binary number generator (PRBG). The enciphered bitplanes are concatenated with unencrypted ones to produce the cipher watermarked image. The validity and novelty of the proposed scheme is verified through exhaustive simulations using different images of two well-known image databases.
Securing digital image during transmission is very much important in the current era. For this purpose, cryptographic techniques as well as chaotic maps can be applicable. In this paper, we have given a detailed study...
详细信息
ISBN:
(纸本)9781479929818
Securing digital image during transmission is very much important in the current era. For this purpose, cryptographic techniques as well as chaotic maps can be applicable. In this paper, we have given a detailed study of the image encryption using different 2d chaotic maps such as Arnold 2d cat map, Baker map, Henon map, Cross chaos map and 2dlogisticmap. The security analysis of these techniques has been done by the help of NPCR (Number of Pixels Change Rate) and UACI (Unified Average Changing Intensity) values. The experimental results of NPCR and UACI show the effectiveness of the encryption processes of different techniques.
暂无评论