CHAOTIC IMAGE ENCRYPTION WITH RANDOM SHUFFLING OF DATA

被引:2
作者
Aydos, Murat [1 ]
Ugur, Alper [2 ]
机构
[1] Hacettepe Univ, Fac Engn, Comp Engn Dept, TR-06800 Ankara, Turkey
[2] Pamukkale Univ, Engn Fac, Comp Engn Dept, TR-20070 Denizli, Turkey
来源
PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI | 2014年 / 20卷 / 02期
关键词
Cryptography; Encryption; Chaotic image encryption; Self-diagonal shuffler;
D O I
10.5505/pajes.2014.18209
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security of valuable multimedia contents such as images in personal photograph albums, electronic publishing, frames of multicast video conference can be achieved by image encryption. Secure transmission of these contents is required to be rapid, efficient and practical. Hence, image encryption process must be chosen not only to satisfy the security goals but also to fulfill these requirements. Due to the inadequacy and inefficiency of conventional text based information encryption methods, researchers have proposed several encryption schemes. Many of them are based on chaotic algorithms. Recently, the studies are concentrated on some weaknesses of chaotic algorithms and most of the presented solutions came up with complex structured chaotic maps. In this paper, we present a self-diagonal shuffler mechanism embedded to one dimensional chaotic encryption system to overcome its leak points while keeping simplicity and efficiency properties.
引用
收藏
页码:31 / 35
页数:5
相关论文
共 50 条
[31]   Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text [J].
Ataş M.T. ;
Güler H. .
International Journal of Applied and Computational Mathematics, 2022, 8 (4)
[32]   An Enhanced Image Encryption Technique using DES Algorithm with Random Image overlapping and Random key Generation [J].
Shivhare, Ritesh ;
Shrivastava, Ritu ;
Gupta, Chetan .
2018 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATION AND TELECOMMUNICATION (ICACAT), 2018,
[33]   COLOR IMAGE ENCRYPTION SOLUTION BASED ON THE CHAOTIC SYSTEM OF LOGISTIC AND HENON [J].
Zhang Yunpeng ;
Sun Peng ;
Xie Jing ;
Huang Yunting .
ICSOFT 2010: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2010, :275-278
[34]   An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map [J].
Wang, Xingyuan ;
Zhu, Xiaoqiang ;
Zhang, Yingqian .
IEEE ACCESS, 2018, 6 :23733-23746
[35]   Image Encryption : A Random Selection Approach [J].
Rajagopalan, Sundararaman ;
Chandrasekaran, Lakshmi ;
Rengarajan, Amirtharajan ;
Rethinam, Sivaraman ;
Arumugham, Sridevi ;
Kandhaiya, Mohan .
2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
[36]   A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution [J].
Arif, Jameel ;
Khan, Muazzam A. ;
Ghaleb, Baraq ;
Ahmad, Jawad ;
Munir, Arslan ;
Rashid, Umer ;
Al-Dubai, Ahmed Y. .
IEEE ACCESS, 2022, 10 :12966-12982
[37]   An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems [J].
Luo, Yuling ;
Ouyang, Xue ;
Liu, Junxiu ;
Cao, Lvchen .
IEEE ACCESS, 2019, 7 :38507-38522
[38]   Chaotic trigonometric Haar wavelet with focus on image encryption [J].
Ahadpour S. ;
Sadra Y. .
Ahadpour, Sodeif (ahadpour@uma.ac.ir), 1600, Taru Publications (20) :1217-1239
[39]   An Image Encryption Algorithm Based on Oversampled Chaotic Map [J].
Liu, Shucong ;
Song, Yanxing ;
Yang, Jingsong .
MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 :2016-2020
[40]   Chaotic coyote optimization algorithm for image encryption and steganography [J].
Tong, Huawei ;
Li, Tianyou ;
Xu, Youyun ;
Su, Xinzhong ;
Qiao, Guopeng .
MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (07) :20861-20887