Image Encryption Algorithm Based on Chaotic Economic Model
نویسندگان
چکیده
منابع مشابه
Breaking a chaotic image encryption algorithm based on perceptron model
Recently, a chaotic image encryption algorithm based on perceptron model was proposed. The present paper analyzes security of the algorithm and finds that the equivalent secret key can be reconstructed with only one pair of known-plaintext/ciphertext, which is supported by both mathematical proof and experiment results. In addition, some other security defects are also reported.
متن کاملA Novel Color Image Encryption Algorithm Based on Chaotic Maps
Due to the character of higher security of three-dimensional chaotic systems, a new algorithm based on Chen and Lorenz systems is proposed to encrypt color images. In order to increase the security of the cryptosystem, the algorithm firstly integrates image information into the Lorenz map, and then the image information is also mixed into the Chen map via the Lorenz map. Theoretical analysis an...
متن کاملCracking a hierarchical chaotic image encryption algorithm based on permutation
In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value levels into K blocks of the same size and then operates position permutation on two levels: intra-block and inter-block. As a typical position permutation-only encryption algorithm, it has received intensive attention. The present paper an...
متن کاملImage Encryption Algorithm Based on a Chaotic Iterative Process
The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt securely bit sequences and assuring confusion, diffusion and indistinguishability properties in the cipher. The algorithm is applied on the image encryption where the plain-image is vi...
متن کاملEnhanced Chaotic Image Encryption Algorithm Based on Trigonometric Functions
The advent of wireless communications, both inside and outside the home-office environment has led to an Increased demand for effective encryption systems. The encryption of images is quite different from that of the texts due to the bulk data capacity and high redundancy of images. Traditional methods are difficult to handle the image encryption because of their small space of pseudo random se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2015
ISSN: 1024-123X,1563-5147
DOI: 10.1155/2015/341729