scispace - formally typeset
Proceedings ArticleDOI

Analysis of Hybrid Chaotic Image Encryption

Reads0
Chats0
TLDR
This paper will discuss image encryption using combined chaos by combining various chaotic maps like logistics map, singer map, tent map, sine map, piecewise map etc and attempt to compare the results for better combination for encryption.
Abstract
The Internet advances in the past decade have been upping at a tremendous pace; especially in the fields like medicine, military, and technology, where lot of internet threats have also been raising, at least at the same rate, if not higher. The communication takes place in the form of text, image, voice, and video signals etc. And we deal with more image-based applications. There are many encryption techniques existing-DES, AES, RSA, etc. but they provide less security and are vulnerable to brute force attacks due to factors like small key space, to avoid which, chaos-based encryption was introduced. Chaotic systems are very sensitive to initial conditions and distort the image to beyond reversible state, except with a protection key with which it is encrypted, which is hard to find in such a large key space. In this paper we will discuss image encryption using combined chaos by combining various chaotic maps like logistics map, singer map, tent map, sine map, piecewise map etc. and attempt to compare the results for better combination for encryption.

read more

Citations
More filters
Journal ArticleDOI

A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications

TL;DR: A lightweight and efficient security scheme based on chaotic algorithms to efficiently encrypt digital images that overcomes the performance of other existing techniques.
Journal ArticleDOI

New Chaotic System: M-Map and Its Application in Chaos-Based Cryptography

Marcin Lawnik, +1 more
- 27 Apr 2022 - 
TL;DR: The obtained bifurcation diagram and the plot of the Lyapunov exponent suggest that the so-called robust chaos characterizes this map, and the article proposes a new image encryption algorithm that uses, among others, cyclically shifted S-box or saving encrypted pixels on the first or last free space in the cipher-image.
Book ChapterDOI

ExclusiveOR-Discrete Cosine Transform- A Chaotic Algorithm for Image Encryption and Decryption

TL;DR: Chaotic concepts avoids iteration of the image data by the unintended persons and the performance of the ExclusiveOR-Discrete Cosine Transform XORDCT algorithm is analyzed by PSNR, NPCR, UACI and Correlation coefficient factors.
References
More filters

NPCR and UACI Randomness Tests for Image Encryption

TL;DR: The question of whether a given NPCR/UACI score is sufficiently high such that it is not discernible from ideally encrypted images is answered by comparing actual NPCR and UACI scores with corresponding critical values.
Journal ArticleDOI

A novel bit-level image encryption algorithm based on chaotic maps

TL;DR: A novel bit-level image encryption algorithm that is based on piecewise linear chaotic maps (PWLCM) that is both secure and reliable for image encryption.
Journal ArticleDOI

A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation

TL;DR: A hyper-chaos-based image encryption algorithm that adopts a 5-D multi-wing hyper-chaotic system, and the key stream generated by hyper- Chaotic system is related to the original image and pixel- level permutation and bit-level permutation are employed to strengthen security of the cryptosystem.
Journal ArticleDOI

A review of chaos-based firefly algorithms

TL;DR: A concise but comprehensive overview of firefly algorithms that are enhanced with chaotic maps is presented, to describe in detail the advantages and pitfalls of the many different chaotic maps, as well as to outline promising avenues and open problems for future research.
Journal ArticleDOI

A new chaos-based image encryption system

TL;DR: The proposed chaos-based cryptosystem is a new and efficient structure based on a binary diffusion layer followed by a bit-permutation layer that has a shorter encryption, while having a very high level of security.
Related Papers (5)