A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1
Abstract
The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditional encryption methods. In this communication, a new image encryption algorithm based on three different chaotic maps is proposed. In the proposed algorithm, the plain-image is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out using 2D Cat map. Further, the control parameters of shuffling are randomly generated by employing 2D coupled Logistic map. After that the shuffled image is encrypted using chaotic sequence generated by one-dimensional Logistic map. The experimental results show that the proposed algorithm can successfully encrypt/decrypt the images with same secret keys, and the algorithm has good encryption effect, large key space and high sensitivity to a small change in secret keys. Moreover, the simulation analysis also demonstrates that the encrypted images have good information entropy, very low correlation coefficients and the distribution of gray values of an encrypted image has random-like behavior.
Authors and Affiliations
Musheer Ahmad , M. Shamsher Alam
Improving Capacity of soft Handoff Performance in Wireless Mobile Communication using Macro Diversity
The soft handoff is a process on transferring the on going call from one radio resource to another radio resource without any interruption. Rather, mobile unit looks next base station for possible new connection without...
A Context-Dependent Trust Model for the MAC Layer in LR-WPANs
Low rate wireless personal networks are vulnerable to several attacks focused on the Media Access Layer. Malicious or faulty nodes can subvert CSMA/CA and GTS allocation algorithms, achieving MAC unfairness in order to o...
CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks
Mobile Adhoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of stablished infrastructure. Mobile Adhoc network are vulnerable to attacks compared to wired networks...
OUTLOOK ON VARIOUS SCHEDULING APPROACHES IN HADOOP
MapReduce is used for processing and generating sets large data .A open source framework of MapReduce is Hadoop [1]. MapReduce and Hadoop represent a good alternative for efficient large scale data processing and advance...
On Human Intelligence
This paper presents some detailed discussions regarding the human natural intelligence, along with various types of intelligences. The authors have also given some important factors on which the intelligence depends. The...