Chaos Baker-based Image Encryption in Operation Modes
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2018, Vol 17, Issue 1
Abstract
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chaining (CBC), output feedback chaining (OFB), and cipher feedback chaining (CFB). The proposed method works by applying the chaos baker map in different operation modes for encrypting digital images. A group of tests were carried out to examine the impact of operation modes on chaos baker-based encryption. This is done using several encryption metrics like visual inspection, statistical measures, entropy measure, encryption quality measures, and noise resistance measures. Simulation results demonstrated the effectively of baker-based encryption in CBC mode.
Authors and Affiliations
Mohammed Alzain
A Survey of Wireless Sensor Network Routing Protocols based on SPIN
SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols that proficiently disseminate data in wireless sensor network(WSN).SPIN overcomes certain deficiencies associated with some...
Performance Analysis and Evaluation of Hybrid Network using different Integrated Routing Protocols
The increasing demand of computer communication networks are growing rapidly day by day. With the growing need to distribute applications across multiple networks and the availability of high capacity, high-performance i...
Continuously Moving Objects Framework to Monitor Result Changes of Spatio Temporal Queries using Data Stream Management System
In this paper the concept of safe limit in the framework for continuously moving objects to monitor result changes of spatio temporal queries has been proposed. In this framework the movement of the moving object is moni...
A Novel Prime Number Path Tracing Scheme Using Clos Network
A novel scheme of path tracing in all-optical network (AON) is described, every node has a prime number and as data packet travels in the network prime number tag is multiplied with the other node tag. At receiver end fa...
A Word & Character N-Gram based Arabic OCR Error Simulation model
This paper provides a new model aimed to enhanceArabic OCR degraded text retrieval effectiveness. The proposed model based onsimulating the Arabic OCR recognition mistakesbased on both, word based and Character N-Gram ap...