Cryptography in social networks using wavelet transform, fractals and chaotic functions

Journal Title: International Research Journal of Applied and Basic Sciences - Year 2015, Vol 9, Issue 9

Abstract

In the past two decades, with respect to development of technologies related to the data transmission and social networks, need for secure communications is strongly felt. The proposed encryption method in this paper is based on the combination of chaotic systems, wavelet transform and fractal key. In the first step of cryptography, the approximated image derived by wavelet transform is extracted. The image size will be reduced in the approximated image and consequently the amount of calculation in proposed method will be reduced as well. In the second step of cryptography, the pattern derived by fractals has been used as encryption key. The advantage of this step is separate encryption on each three layers of image, R, G, and B. In the third step of cryptography, the pixels of image which is obtained in second step will be permuted through appropriate scheme based on logistic sequence. Finally in the last step, the pixels of image which is obtained in previous step will be substituted through chaos functions. Results related to the correlation between pixels in encrypted and decrypted images indicate that the correlation between pixels of encrypted image will tend to zero when the chaos function and fractal key are used in cryptography. In the encrypted image, the correlation coefficient between adjacent pixels is close to zero and in the decrypted image, this coefficient is close to one. Using PSNR test, encryption strength can be realized. As the fractals is used for encryption, we can create the encryption key using adjacent pixels. The more pixels used in encryption get the lower PSNR rate.

Authors and Affiliations

Siavash Sattari| Computer Engineering Department of Islamic Azad University Science and Research Branch, Larestan, Iran. email: Siavash.Sattari1@gmail.com, Abbas Akkasi| Computer Engineering Department of Islamic Azad University Science and Research Branch, Tehran, Iran., Ramin Ahmadi Lari| Computer Engineering Department of Islamic Azad University Science and Research Branch, Larestan, Iran., Mohammad Khodaparasti| Computer Engineering Department of Islamic Azad University Science and Research Branch, Larestan, Iran.

Keywords

Related Articles

The relationship between institutional ownership and discretionary and nondiscretionary factors accruals quality firms Listed on Stock Exchange

Income reported in the financial statements as one of the most important measures of performance and firm value is considered. It has always been used for wide range of users such as shareholders, investors and stockbrok...

The Spiritual Intelligence (SI) components from the perspective of Islam and West

This paper deals with introduction of the West and Islamic perspective on Spiritual Intelligence (SI). After defining intelligence, different perspectives on SI areprovided. Dimensions and characteristics of each of them...

Principles of disinfecting domestic wastewater for irrigation

In order to remove pathogens from wastewater to be used in agriculture, World Health Organization (WHO) has published a guide book titled “Guidelines for the safe use of wastewater excreta and gray water” in four volumes...

Comparing anthropometric characteristics, body fat percentage and fitness between 13-17 years old girls

The purpose of this study was to compare anthropometric circumference, physical fitness and beady fat percentage aged 13-17 years. 124 pupils (the one and two districts, ages 13-14 years, 13- 17 years old, 10157, 10649)...

Comparison of flow rates' classification method and Psiac method in calculating sediments entered into dams' reservoir (Case Study of Ilam's Dam)

Considering the prominent importance of Ilam's dam in supplying edible and agricultural water, and flood control, therefore, trying to reduce its sedimentation is useful and necessary. In this article, by using different...

Download PDF file
  • EP ID EP7137
  • DOI -
  • Views 398
  • Downloads 20

How To Cite

Siavash Sattari, Abbas Akkasi, Ramin Ahmadi Lari, Mohammad Khodaparasti (2015). Cryptography in social networks using wavelet transform, fractals and chaotic functions. International Research Journal of Applied and Basic Sciences, 9(9), 1627-1635. https://europub.co.uk/articles/-A-7137