Secure Image Transcoding technique using chaotic key based algorithm with improved security

被引:0
|
作者
Anoop, B. N. [1 ]
George, Sudhish N. [1 ]
Deepthi, P. P. [1 ]
机构
[1] NIT Calicut, Dept ECE, Calicut 673601, Kerala, India
关键词
Transcoding; Chaotic Key Based Algorithm (CKBA); Encryption; Known-plaintext attack (KPA);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transcoding is the direct digital-to-digital data conversion of one encoding to another. This paper proposes a system of secure image transcoder which mainly focuses on multimedia applications such as web browsing through mobile phones, in order to improve their delivery to client devices with wide range of communication, storage and display capabilities. In this work, we propose a secure image transcoding technique based on a chaotic key. To improve the security of the above mentioned system, we have incorporated a variable block size selection prior to this stage. We analyzed the security of the proposed system and it is proved that the proposed system is highly secure against several forms of attack. The performance of the system is evaluated for different images and it is verified that the system is having less resource complexity with good performance.
引用
收藏
页码:693 / 697
页数:5
相关论文
共 50 条
  • [41] Image Secure Transmission Using Chaotic Synchronization
    Bouridah, Mohammed Salah
    Bouden, Toufik
    Boulkroune, Abdesselem
    2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [42] Substitution Steganography with Security Improved by Chaotic Image Encryption
    Oravec, Jakub
    Turan, Jan
    2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 284 - 288
  • [43] Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding
    Zhang, Qiuyu
    Han, Jitian
    Ye, Yutong
    IET IMAGE PROCESSING, 2019, 13 (14) : 2905 - 2915
  • [44] Chaotic Secure Image Coding Based on SPIHT
    Lin, Rong
    Mao, Yaobin
    Wang, Zhiquan
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1229 - 1232
  • [45] Image Encryption Using Dynamic Image as a Key Based on Multilayers of Chaotic Permutation
    Jirjees, Seerwan W.
    Alkalid, Farah F.
    Shareef, Waleed F.
    SYMMETRY-BASEL, 2023, 15 (02):
  • [46] A dual secure digital image watermark algorithm using wavelet fractaland chaotic sequence
    Yang, Sumin
    Wang, Jiazhen
    Peng, De-yun
    Zhang, Zhengbao
    DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, : 369 - 372
  • [47] A secure image steganography based on LSB technique and 2D chaotic maps
    Khalil, Noura
    Sarhan, Amany
    Alshewimy, Mahmoud A. M.
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [48] An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials
    Zhang, Chunfu
    Bai, Jing
    Liang, Yanchun
    Tavares, Adriano
    Wang, Lidong
    Gomes, Tiago
    Pinto, Sandro
    ALGORITHMS, 2024, 17 (09)
  • [49] A Secure Image Encryption Algorithm Based on Multiple One-dimensional Chaotic Systems
    Song, Yinglei
    Song, Jia
    Qu, Junfeng
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 584 - 588
  • [50] A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications
    Anusree, L.
    Rahiman, M. Abdul
    INTERNATIONAL JOURNAL OF OPTICS, 2022, 2022