Digital Communication Based on Image Security using Grasshopper Optimization and Chaotic Map

نویسندگان

چکیده

Encryption is very important to protect sensitive data, especially images, from any illegal access and infringement. This research presented provide an image encryption optimization method for communication based on security. uses the grasshopper algorithm perform optimal irregular logical mapping. Initially, this approach creates multiple encrypted images a chaotic map, in which session key initial conditions of map depends simple suspended image. After that, work as particles set through algorithm. The optimized encoded with correlation coefficient continuous pixels expressed function proportion. results Matlab simulation proposed encoding show that are same, adjacent highly correlated other outstanding rows, such planar histogram entropy effective pixel rate change average correction strength.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the Security of Spatial Domain Based Digital Image Watermarking using Chaotic Map and Cellular Automation

The security of digital image watermarking is improved by scrambling the watermark using different chaotic maps or cellular automata in such a way that an unauthorized person can’t recover the watermark without the secret keys. In this proposed scheme three secret keys are used in which one key is used to make the watermark chaotic and other two keys are used for scrambling the cover image. In ...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

A novel digital communication system using chaotic map

A technique for exploiting deterministic chaos through Logistic Map (with DC component) and a Cubic Map (with no DC component) in a new digital communication has been proposed and demonstrated in presence of additive white Gaussian noise (AWGN) by Monte Carlo simulations. Biterror (BER) graphs were computed in order to compare the performance of the different modulation schemes. The best perfor...

متن کامل

On the security of a new image encryption scheme based on chaotic map lattices.

This paper reports a detailed cryptanalysis of a recently proposed encryption scheme based on the logistic map [A. Pisarchik et al., Chaos 16, 033118 (2006)]. Some problems are emphasized concerning the key space definition and the implementation of the cryptosystem using floating-point operations. It is also shown how it is possible to reduce considerably the key space through a ciphertext-onl...

متن کامل

Chaotic Map Based Random Image Steganography Using LSB Technique

Steganography play an important role to transfer secret data over insecure network. Moreover digital images are taken as a cover to communicate the sensitive data. One of the simplest approach of embedding the secret data into cover image is Least Significant Bit (LSB) method. This paper aims to propose a new symmetric key based image hiding technique. Pseudo random keys are generated by using ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of engineering. Transactions A: basics

سال: 2022

ISSN: ['1728-1431']

DOI: https://doi.org/10.5829/ije.2022.35.10a.16