Improving Image Encryption Using 3D Cat Map and Turing Machine
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
Security of data is of prime importance. Security is a very complex and vast topic. One of the common ways to protect this digital data from unauthorized eavesdropping is encryption. This paper introduces an improved image encryption technique based on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The algorithm consists of two main sections: The first does a preprocessing operation to shuffle the image using 3D chaotic map in the form of dynamic random growth technique. The second uses Turing machine simultaneous with shuffling pixels’ locations to diffuse pixels’ values using a random key that is generated by chaotic 3D cat map. The hybrid compound of a 3D chaotic system and Turing machine strengthen the encryption performance and enlarge the key space required to resist the brute force attacks. The main advantages of such a secure technique are the simplicity and efficiency. These good cryptographic properties prove that it is secure enough to use in image transmission systems.
Authors and Affiliations
Nehal Mohamed, Mostafa El-Azeim, Alaa Zaghloul
Trust: A Requirement for Cloud Technology Adoption
Cloud computing is a recent model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services; that can be rapidly...
Computerized Steganographic Technique using Fuzzy Logic
Steganography is the method of providing Computer security in which hiding the required information is done by inserting messages within other messages, which is a string of characters containing the useful information,...
Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution
Companies, businesses, colleges, etc. throughout the world use computer networks and telecommunications to run their operations. The convenience, information-gathering, and organizational abilities provided by computer n...
A Platform to Support the Product Servitization
Nowadays manufacturers are forced to shift from their traditional product-manufacturing paradigm to the goods-services continuum by providing integrated combination of products and services. The adoption of service-based...
Robust Video Content Authentication using Video Binary Pattern and Extreme Learning Machine
Recently, due to easy accessibility of smartphones, digital cameras and other video recording devices, a radical enhancement has been experienced in the field of digital video technology. Digital videos have become very...