A novel chaotic image encryption technique based on multiple discrete dynamical maps

被引:139
作者
Khan, Majid [1 ,2 ]
Masood, Fawad [1 ,3 ]
机构
[1] Inst Space Technol, CISL, Islamabad, Pakistan
[2] Inst Space Technol, Dept Appl Math & Stat, Islamabad, Pakistan
[3] Inst Space Technol, Dept Elect Engn, Islamabad, Pakistan
关键词
Image encryption; Confusion; Diffusion; Multiple chaotic maps; PERMUTATION; ALGORITHM; SCHEME; CONSTRUCTION; SECURE; TRANSFORM; BOX;
D O I
10.1007/s11042-019-07818-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The propagation of information over insecure communication system is one of the most important aspect of digitally advance era. The electronic information is travels in form of binary bits. The secrecy of these digital contents is one of the most important issue of existing world. In this article, we have utilized multiple chaotic iterative maps in order to propose a novel image encryption technique. The suggested encryption added confusion as well as diffusion in offered scheme which is one of the most fundamental aspect of encryption technique. We have tested our anticipated scheme against different performances analysis and compared it with already existing results. The designed scheme is capable of providing an excellent privacy to digital images.
引用
收藏
页码:26203 / 26222
页数:20
相关论文
共 45 条
[1]  
Abokhdair Nuha Omran, 2010, Proceedings of the 2010 6th International Conference on Digital Content, Multimedia Technology and its Applications (IDC 2010), P20
[2]   Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys [J].
Ahmad, Musheer ;
Ahmad, Tanvir .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 12 (01) :113-128
[3]   A Framework to Protect Patient Digital Medical Imagery for Secure Telediagnosis [J].
Ahmad, Musheer ;
Ahmad, Tanvir .
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 :1055-1066
[4]  
Ahmad M, 2011, COMM COM INF SC, V168, P81
[5]   Impact of digital fingerprint image quality on the fingerprint recognition accuracy [J].
Alsmirat, Mohammad A. ;
Al-Alem, Fatimah ;
Al-Ayyoub, Mahmoud ;
Jararweh, Yaser ;
Gupta, Brij .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (03) :3649-3688
[6]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[7]   Theory and practice of chaotic cryptography [J].
Amigo, J. M. ;
Kocarev, L. ;
Szczepanski, J. .
PHYSICS LETTERS A, 2007, 366 (03) :211-216
[8]  
[Anonymous], HDB RES MODERN CRYPT
[9]  
[Anonymous], COMMUNICATIONS COMPU
[10]  
[Anonymous], MULTIMED TOOLS APPL