2017
DOI: 10.4236/jis.2017.81003
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Chaos-Based Image Cryptosystem with an Improved Key Generator and Plain Image Sensitivity Mechanism

Abstract: In this paper, we propose an effective gray image cryptosystem containing Arnold cat map for pixel permutation and an improved Logistic map for the generation of encryption keys to be used for pixel modification. Firstly, a new chaotic map is designed to show better performance than the standard one in terms of key space range, complexity and uniformity. Generated secret key is not only sensitive to the control parameters and initial condition of the improved map but also strongly depend on the plain image cha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Applications of chaotic systems in engineering science have become very popular especially in the field of secure communication, cryptography, steganography for the last decades. Encryption techniques based on chaos gain more concern in the secure communication areas due to complexity, sensitivity of initial condition, random-like behavior and ergodicity of chaos which meet Shannon's requirement in cryptography [47][48][49][50][51].…”
Section: A Chaos Encryptionmentioning
confidence: 99%
“…Applications of chaotic systems in engineering science have become very popular especially in the field of secure communication, cryptography, steganography for the last decades. Encryption techniques based on chaos gain more concern in the secure communication areas due to complexity, sensitivity of initial condition, random-like behavior and ergodicity of chaos which meet Shannon's requirement in cryptography [47][48][49][50][51].…”
Section: A Chaos Encryptionmentioning
confidence: 99%
“…The proposed algorithm used to increase the confusion and diffusion of speech samples. From [18], a new algorithm for speech encryption was introduced by dividing the speech signal into overlapped blocks prior shuffling those blocks into the time domain. A second permutation is performed for the coefficients of the block which was obtained from the wavelet transforms by using chaotic key based on Hénon map, and partially encoding the shuffled online speech signal in a transform scope.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In FFCT phase, a plain image is transformed into a temporary cipher image, which is further encrypted using a secret key obtained through multi-fractal images. Similarly, in [42], a system key was generated by using multiple fractal images by adding feedback delay, multiplexing and independent horizontal and vertical shifts in the process. However, a cryptosystem was designed by using different keys at each iteration to encrypt the image [43].…”
Section: Related Workmentioning
confidence: 99%