Secure Image Transcoding technique using chaotic key based algorithm with improved security

被引:0
|
作者
Anoop, B. N. [1 ]
George, Sudhish N. [1 ]
Deepthi, P. P. [1 ]
机构
[1] NIT Calicut, Dept ECE, Calicut 673601, Kerala, India
关键词
Transcoding; Chaotic Key Based Algorithm (CKBA); Encryption; Known-plaintext attack (KPA);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transcoding is the direct digital-to-digital data conversion of one encoding to another. This paper proposes a system of secure image transcoder which mainly focuses on multimedia applications such as web browsing through mobile phones, in order to improve their delivery to client devices with wide range of communication, storage and display capabilities. In this work, we propose a secure image transcoding technique based on a chaotic key. To improve the security of the above mentioned system, we have incorporated a variable block size selection prior to this stage. We analyzed the security of the proposed system and it is proved that the proposed system is highly secure against several forms of attack. The performance of the system is evaluated for different images and it is verified that the system is having less resource complexity with good performance.
引用
收藏
页码:693 / 697
页数:5
相关论文
共 50 条
  • [21] Chaotic and Paillier secure image data sharing based on blockchain and cloud security
    Singh, C. Edward Jaya
    Sunitha, C. Adline
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 198
  • [22] A Lightweight Image Encryption Algorithm Based on Secure Key Generation
    Ali, A'Laa Hussein
    Gbashi, Ekhlas Khalaf
    Alaskar, Haya
    Hussain, Abir Jaafar
    IEEE ACCESS, 2024, 12 : 95871 - 95883
  • [23] An Improved Chaotic Image Encryption Algorithm
    Al-Khasawneh, Mahmoud Ahmad
    Shamsuddin, Siti Mariyam
    Hasan, Shafaatunnur
    Abu Bakar, Adamu
    2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE), 2018,
  • [24] An Improved Image Encryption Algorithm Based on Chaotic Logistic Map
    Wang Feng-ying
    Hu Xiao-li
    Cui Guo-wei
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 2, 2012, : 105 - 107
  • [25] Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift
    Li, Weihai
    Yuan, Yuan
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 3694 - +
  • [26] Secure communication by using key function based on chaotic system synchronization
    Huang, XY
    Chen, YH
    Huang, HM
    WAVELET ANALYSIS AND ACTIVE MEDIA TECHNOLOGY VOLS 1-3, 2005, : 357 - 362
  • [27] Improving security of parallel algorithm using key encryption technique
    Sujitha, G.
    Varadharajan, M.
    Vignesh Rao, Y.
    Sridev, R.
    Sarvesh Gauthaum, M.K.
    Narayanan, Sowmy
    Swarna Raja, R.
    Mercy Shalinie, S.
    Information Technology Journal, 2013, 12 (12) : 2398 - 2404
  • [28] Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security
    Almasoud, Ahmed S.
    Alabduallah, Bayan
    Alqahtani, Hamed
    Aljameel, Sumayh S.
    Alotaibi, Saud S.
    Mohamed, Abdullah
    HELIYON, 2024, 10 (03)
  • [29] A secure image encryption algorithm based on chaotic maps and SHA-3
    Ye, Guodong
    Huang, Xiaoling
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2015 - 2023
  • [30] A secure image encryption based on spatial surface chaotic system and AES algorithm
    Fuyan Sun
    Zongwang Lv
    Multimedia Tools and Applications, 2022, 81 : 3959 - 3979