Image Encryption Using Chaos and Block Cipher
نویسندگان
چکیده
منابع مشابه
Image Encryption Using Chaos and Block Cipher
In this paper, a novel image encryption scheme is proposed based on combination of pixel shuffling and new modified version of simplified AES. Chaotic baker’s map is used for shuffling and improving S-AES efficiency through S-box design. Chaos is used to expand diffusion and confusion in the image. Due to sensitivity to initial conditions, chaotic baker’s map has a good potential for designing ...
متن کاملAn Image Encryption Approach Using Chaos and Stream Cipher
In this paper, a novel image encryption scheme is proposed based on combination of pixel shuffling and W7. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. So a chaotic Henon map is used to generate permutation matrix. An external secret key is used to derive the initial conditions for the chaotic map and W7 secret key. Pixel sh...
متن کاملImage Encryption Using Advanced Hill Cipher Algorithm
The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, ...
متن کاملJoint Encryption and Watermarking Technique Using Block Cipher and Wavelet
This paper proposes a joint encryption and watermarking technique based on random block permutation and DWT with the motivation to enhance the security of the multimedia content. The original image is sectioned into the blocks and shuffle the blocks using random permutation, In this technique copyright information is concealed into an encrypted image. Based on the results, permutation of blocks...
متن کاملChaos Image Encryption using Pixel shuffling
The advent of wireless communications, both inside and outside the home-office environment has led to an increased demand for effective encryption systems. The beauty of encryption technology comes out in more pronounced way when there is no absolute relation between cipher and original data and it is possible to rebuild the original image in much easier way. As chaotic systems are known to be ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer and Information Science
سال: 2010
ISSN: 1913-8997,1913-8989
DOI: 10.5539/cis.v4n1p172