Cryptography in social networks using wavelet transform, fractals and chaotic functions

Journal Title: International Research Journal of Applied and Basic Sciences - Year 2015, Vol 9, Issue 9

Abstract

In the past two decades, with respect to development of technologies related to the data transmission and social networks, need for secure communications is strongly felt. The proposed encryption method in this paper is based on the combination of chaotic systems, wavelet transform and fractal key. In the first step of cryptography, the approximated image derived by wavelet transform is extracted. The image size will be reduced in the approximated image and consequently the amount of calculation in proposed method will be reduced as well. In the second step of cryptography, the pattern derived by fractals has been used as encryption key. The advantage of this step is separate encryption on each three layers of image, R, G, and B. In the third step of cryptography, the pixels of image which is obtained in second step will be permuted through appropriate scheme based on logistic sequence. Finally in the last step, the pixels of image which is obtained in previous step will be substituted through chaos functions. Results related to the correlation between pixels in encrypted and decrypted images indicate that the correlation between pixels of encrypted image will tend to zero when the chaos function and fractal key are used in cryptography. In the encrypted image, the correlation coefficient between adjacent pixels is close to zero and in the decrypted image, this coefficient is close to one. Using PSNR test, encryption strength can be realized. As the fractals is used for encryption, we can create the encryption key using adjacent pixels. The more pixels used in encryption get the lower PSNR rate.

Authors and Affiliations

Siavash Sattari| Computer Engineering Department of Islamic Azad University Science and Research Branch, Larestan, Iran. email: Siavash.Sattari1@gmail.com, Abbas Akkasi| Computer Engineering Department of Islamic Azad University Science and Research Branch, Tehran, Iran., Ramin Ahmadi Lari| Computer Engineering Department of Islamic Azad University Science and Research Branch, Larestan, Iran., Mohammad Khodaparasti| Computer Engineering Department of Islamic Azad University Science and Research Branch, Larestan, Iran.

Keywords

Related Articles

Survey of electrocoagulation process Performance (with iron-rod electrode) in treatment of drinking water- case study: Kermanshah Soleymanshah dam

In this study has been investigated electrocoagulation process with Fe electrode in batch mode for treatment of surface water. The design of experiment runs were carried out using a central composite design (CCD). After...

The Linguistic Study of Prose Style in “Buf-e-Kur” by Sadegh Hedayat an Iranian writer with respect to the Frequency of Different Types of Deviation

This study is an attempt to find out the frequency of eight kinds of linguistic deviation in a novel called "Buf-e-kur" by “Sadegh Hedayat” an Iranian short story writer. Deviation as a foregrounding means is a creative...

Effect of rosemary (Rosmarinus officinalis) essence on quality and langevidy of boroccli

Aging changes occur rapidly in broccoli and this is the cause of reducing the nutritional quality of the product. However, maintaining the freshness and quality of this product according to the economic impact is importa...

Religious theory (behavioral virtues) in Alzahawi’s poems

This paper studies the beliefs and thoughts of Alzahawi about good and bad characteristics of human and somewhere expresses them based on Quran verses since he was a poet who valued people significantly and guided them t...

Culture clash in books of teaching Persian language to English speakers

Despite the importance of communicative competence in foreign language education, achieving language skills without proper recognition of culture is unstable and dysfunctional and inevitably inter-cultural differences be...

Download PDF file
  • EP ID EP7137
  • DOI -
  • Views 395
  • Downloads 20

How To Cite

Siavash Sattari, Abbas Akkasi, Ramin Ahmadi Lari, Mohammad Khodaparasti (2015). Cryptography in social networks using wavelet transform, fractals and chaotic functions. International Research Journal of Applied and Basic Sciences, 9(9), 1627-1635. https://europub.co.uk/articles/-A-7137