2020
DOI: 10.2478/cait-2020-0005
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform

Abstract: This paper presents an efficient image cipher based on applying the chaotic Baker Map (BM) in the Discrete Cosine Transform (DCT). The encryption module of the proposed DCT-based BM image cipher employs a DCT on the original plain-image then, the DCT coefficients of the plain-image are shuffled with the BM. Finally, the inverse DCT is applied to the shuffled plain-image DCT coefficients to obtain the final cipher-image. The decryption module of the proposed DCT-based BM image cipher employs a DCT on the input … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…Another paper [16] utilized Fractional Fourier Transform (FrFT) and chaotic logistic mapping to produce secure optical encryption scheme. First, it shuffled and modulated each color channel of the original image using 2D logistic map and random mask, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Another paper [16] utilized Fractional Fourier Transform (FrFT) and chaotic logistic mapping to produce secure optical encryption scheme. First, it shuffled and modulated each color channel of the original image using 2D logistic map and random mask, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, H(P c , S 2 ) can be used as a seed for a random number generator (RNG) and the RNG output determines the indices of theT bits placed in the least significant bit (LSB) of the image pixels. Another way is to use permutation maps such as the baker map [14] to scrambleT in the image and use H(P c , S 2 ) as the key of the map. The client finally sends the generated image along with S, S 1 and S 2 .…”
Section: The Proposed Password-based Authentication Systemmentioning
confidence: 99%
“…The size of the T andT images are 20 × 90 pixels. The hash function used in this analysis is SHA-3 256-bit [16] and the baker map is used for the scrambling process [14]. The parameters used in these tests are shown in Table 3.…”
Section: Performance Analysismentioning
confidence: 99%
“…While chaoticbased image encryption utilizes Shannon rules [12] that employ confusion-diffusion operations depending on non-linearity theorems [13][14][15][16]. Chaotic-based encryption schemes may be employed in spatial and frequency domains [17][18][19]. Chaotic functions offer several merits like their sensitivity to the initial conditions, which results in secure cryptographic systems against parameter perturbation.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, chaotic-based encryption algorithms are being used recently in image cryptography systems [23][24][25][26][27]. In [17], a colored image encryption scheme based on utilizing the Discrete Cosine Transform (DCT) with a chaotic baker map was presented. First, the three-color image components are transformed to the frequency domain with the DCT.…”
Section: Introductionmentioning
confidence: 99%