A Combined Encryption Compression Scheme Using Chaotic Maps
نویسندگان
چکیده
منابع مشابه
A Highly Secure Image Encryption Scheme using Compound Chaotic Maps
During the last two decades various chaotic image encryption algorithms have been proposed, but most of them encountered some defects like small key space, low speed, lack of robustness and weak security. This paper proposes a chaos-based image encryption scheme with a permutation–diffusion mechanism, where six skew tent maps and one sixdimensional Arnold map are utilized to generate one hybrid...
متن کاملAn Improved Image Encryption Scheme Using Chaotic Logistic Maps
Chaos theory has significantly contributed towards the development of fast and secure image encryption algorithms. Authors in [1] proposed an efficient and secure approach for image encryption based on chaotic logistic maps. The algorithm uses an 80-bit secret key and two chaotic logistic maps, whose initial conditions are derived using the secret key. Depending upon the outcome of logistic map...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملSpatial Domain Video Encryption using Chaotic Maps
Digital video is one of the most popular multimedia data exchanged over the internet. Previous cryptography studies have focused on text data. The encryption algorithms developed for text data may not be suitable to multimedia applications because of large sizes of video. Analgorithm is proposed in which a video file is encrypted by considering each frame a colour image. Each video is broken do...
متن کاملChaotic Encryption Scheme Using 1-D Chaotic Map
This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using vario...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybernetics and Information Technologies
سال: 2013
ISSN: 1314-4081,1311-9702
DOI: 10.2478/cait-2013-0016