Reversible Chaotic Encryption Techniques For Images

被引:0
作者
Shyamala, N. [1 ]
Anusudha, K. [1 ]
机构
[1] Pondicherry Univ, Dept Elect Engn, Pondicherry, India
来源
2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN) | 2017年
关键词
Chaotic techniques; Image encryption; Arnold's cat map; Logistic map; Tent map; ALGORITHM;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use of Arnold's cat map, in which pixel shuffling offers mystifying the image pixels based on the number of iterations decided by the authorized image owner. This is followed by other chaotic encryption techniques such as Logistic map and Tent map, which ensures secure image encryption. The simulation result shows the planned system achieves better NPCR, UACI, MSE and PSNR respectively.
引用
收藏
页数:5
相关论文
共 18 条
[1]  
Baek J, 2004, LECT NOTES COMPUTER, V2947
[2]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266
[3]   Highly secured chaotic block cipher for fast image encryption [J].
Fouda, J. S. Armand Eyebe ;
Effa, J. Yves ;
Ali, Maaruf .
APPLIED SOFT COMPUTING, 2014, 25 :435-444
[4]   Chaos-based image encryption algorithm [J].
Guan, ZH ;
Huang, FJ ;
Guan, WJ .
PHYSICS LETTERS A, 2005, 346 (1-3) :153-157
[5]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[6]   DE-Based Reversible Data Hiding With Improved Overflow Location Map [J].
Hu, Yongjian ;
Lee, Heung-Kyu ;
Li, Jianwei .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2009, 19 (02) :250-260
[7]  
JOHNSON NF, 1998, IEEE COMPUT, V31, P26
[8]   Data hiding based on the similarity between neighboring pixels with reversibility [J].
Li, Yu-Chiang ;
Yeh, Chia-Ming ;
Chang, Chin-Chen .
DIGITAL SIGNAL PROCESSING, 2010, 20 (04) :1116-1128
[9]   Information hiding - A survey [J].
Petitcolas, FAP ;
Anderson, RJ ;
Kuhn, MG .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1062-1078
[10]  
Puech W, 2008, P SPIE SECURITY FORE, V6819