2012
DOI: 10.5923/j.ajsp.20110101.05
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption and Decryption Using Chaotic Maps and Modular Arithmetic

Abstract: In this paper we have proposed a scheme which incorporates the concept of modular arithmetic and chaos theory, for image encryption and decryption. In the proposed scheme, we have used chaos theory to generate the necessary random matrix and used the same for Image encryption. For Decryption, we have used look-up table approach to find the element by element modular inverse of the random matrix and use it for decryption of an encrypted image. Our proposed scheme seems to be robust against various attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…In this analysis, we investigate issues like key related issues, security analysis and channel issues. Correlation and Histogram analysis were specified in all [2,4,5,6,7,8,12,13,14,15,16,17,18,19,20] the reviewed research articles. NPCR and UACI were carried out by most [2,4,5,6,7,8,12,14,15,16,18] of the research papers in order to prove the efficiency of their algorithms.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…In this analysis, we investigate issues like key related issues, security analysis and channel issues. Correlation and Histogram analysis were specified in all [2,4,5,6,7,8,12,13,14,15,16,17,18,19,20] the reviewed research articles. NPCR and UACI were carried out by most [2,4,5,6,7,8,12,14,15,16,18] of the research papers in order to prove the efficiency of their algorithms.…”
Section: Discussionmentioning
confidence: 99%
“…Details like implementation, key related issues, encryption type, resistance against cryptographic and chaos specific attacks are not specified clearly in most of the papers. In some articles, security measures like Mean Absolute Error [8], Mean Square Error [13], Entropy Analysis [4,5,6,12,13,14,15,18], Deviation Measuring Factors [20] and FIPS Test [8] were incorporated. To summarize, if the rules recommended by Gonzalo Alvarez and Shujun Li are followed, a reasonable degree of security and most acceptable features of cryptography can be guaranteed.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations