Image encryption with compound chaotic sequence cipher shifting dynamically

2008 ◽  
Vol 26 (6) ◽  
pp. 843-850 ◽  
Author(s):  
Xiaojun Tong ◽  
Minggen Cui
2016 ◽  
Vol 10 (9) ◽  
pp. 1096-1104 ◽  
Author(s):  
Lingfeng Liu ◽  
Suoxia Miao ◽  
Hanping Hu ◽  
Mengfan Cheng

Author(s):  
Mohit Dua ◽  
Arun Suthar ◽  
Arpit Garg ◽  
Vaibhav Garg

Abstract The chaos-based cryptography techniques are used widely to protect digital information from intruders. The chaotic systems have some of special features that make them suitable for the purpose of encryption. These systems are highly unpredictable and are highly sensitive or responsive to the initial conditions, also known as butterfly effect. This sensitive dependence on initial conditions make these systems to exhibit an intricate dynamical behaviour. However, this dynamical behaviour is not much complex in simple one-dimensional chaotic maps. Hence, it becomes easy for an intruder to predict the contents of the message being sent. The proposed work in this paper introduces an improved method for encrypting images, which uses cosine transformation of 3-D Intertwining Logistic Map (ILM). The proposed approach has been split into three major parts. In the first part, Secure Hash Function-256 (SHA-256) is used with cosine transformed ILM (CT-ILM) to generate the chaotic sequence. This chaotic sequence is used by high-efficiency scrambling to reduce the correlations between the adjacent pixels of the image. In the second part, the image is rotated to move all the pixels away from their original position. In the third part, random order substitution is applied to change the value of image pixels. The effectiveness of the proposed method has been tested on a number of standard parameters such as correlation coefficient, Entropy and Unified average change in intensity. The proposed approach has also been tested for decryption parameters like mean square error and peak signal to noise ratio. It can easily be observed from the obtained results that the proposed method of image encryption is more secure and time efficient than some earlier proposed techniques. The approach works for both color and grey scale images.


2009 ◽  
Vol 27 (8) ◽  
pp. 1035-1039 ◽  
Author(s):  
Chengqing Li ◽  
Shujun Li ◽  
Guanrong Chen ◽  
Wolfgang A. Halang

2019 ◽  
Vol 8 (3) ◽  
pp. 4481-4484

Image encryption has proven a successful method to communicate the confidential information. Some of the images may or may not be confidential. So there is a need to secure the confidential images. Initially, symmetric encryption is used for security purpose. But it has the problem that if the key is revealed the interceptors can immediately decode it. To make the key transformation more secure, asymmetric encryption is introduced. In this two different keys are used for encoding and decoding. So even the interceptors hacked the key it cannot be possible to decode. In this project Elliptic Curve Cryptography (ECC) is utilized for generating the keys and the cross chaotic map used for generating the chaotic sequence. These chaotic sequences are utilized to encode the image for secure communication.


Sign in / Sign up

Export Citation Format

Share Document