Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption

نویسندگان

چکیده

I
 n these days of technology, the usage images has become increasingly high especially now that almost everyone access to internet. Also, image helps us learn, grabs our attention, explains complicated concepts as well inspires us. Sharing is essential and therefore encryption algorithms are proposed secure transmission from many types attacks such Man-in-the-middle attack (MITM). In this paper, we a hybrid security system consist Elliptic Curve Cryptography (ECC) Advanced Encryption System (AES). Where ECC used generate private/public keys AES for decryption using generated keys. The works follows; it begins by inserting be encrypted which “lena.png” size 256*256 passing Algorithm along with public key. Then, in algorithm, key hashed then encrypt algorithm. On other hand, algorithm calculating use decrypt Finally, experimental results shows National Institute Standards Technology (NIST) test have better randomness than only histogram show pixels values distributed across all three channels R, G B. This step further get more against To further, Logistic chaotic map been comparison purposes terms randomness,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image encryption using chaotic logistic map

In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication,wepropose a newapproach for image encryption basedon chaotic logisticmaps in order tomeet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic ...

متن کامل

Image encryption using the two-dimensional logistic chaotic map

Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a se...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

Encryption of Image Using Chaotic Map

The advent of internet has paved the way for transmitting more and more information over the internet in a very less time and multimedia technology is also not untouched with it. Audio, images & other multimedia are being transmitted over the internet. The traditional encryption schemes appear not to be ideal for image applications, due to some intrinsic features of images such as bulk data cap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of interactive mobile technologies

سال: 2023

ISSN: ['1865-7923']

DOI: https://doi.org/10.3991/ijim.v17i10.38787