A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1
Abstract
The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditional encryption methods. In this communication, a new image encryption algorithm based on three different chaotic maps is proposed. In the proposed algorithm, the plain-image is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out using 2D Cat map. Further, the control parameters of shuffling are randomly generated by employing 2D coupled Logistic map. After that the shuffled image is encrypted using chaotic sequence generated by one-dimensional Logistic map. The experimental results show that the proposed algorithm can successfully encrypt/decrypt the images with same secret keys, and the algorithm has good encryption effect, large key space and high sensitivity to a small change in secret keys. Moreover, the simulation analysis also demonstrates that the encrypted images have good information entropy, very low correlation coefficients and the distribution of gray values of an encrypted image has random-like behavior.
Authors and Affiliations
Musheer Ahmad , M. Shamsher Alam
Conditional Random Fields based Pronominal Resolution in Tamil
This paper deals with Tamil pronominal resolution using Conditional Random Fields a machine learning approach. A detailed linguistic analysis of Tamil pronominals and its antecedence occurring in various syntactic constr...
An Improved Hop-Count Metric for Infrastructural Wireless Mesh Network
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. In a WMN...
Performance Analysis of Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks
In this paper the performance of the proposed DLMT and CLMT algorithms are compared. These proposed algorithms tend to extend the node lifetime. Decentralized lifetime maximizing tree(DLMT) features in nodes with higher...
Analysis on Image Processing of Human Hip Joints during Lifting Using MAT Lab and ANSYS
Human Joint paints exhibit abnormal motion and vise versa during movements. Most of the patients were suffering from joint paints. This joint paints like Hip joints, Knee joints, Foot joints, Shoulder joints Elbow joints...
Class hierarchy method to find Change-Proneness
Finding Proneness of software is necessary to identify fault rone and change prone classes at earlier stages of development, so that those classes can be given special ttention. Also to improves the quality and reliabili...