Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption
نویسندگان
چکیده
I
 n these days of technology, the usage images has become increasingly high especially now that almost everyone access to internet. Also, image helps us learn, grabs our attention, explains complicated concepts as well inspires us. Sharing is essential and therefore encryption algorithms are proposed secure transmission from many types attacks such Man-in-the-middle attack (MITM). In this paper, we a hybrid security system consist Elliptic Curve Cryptography (ECC) Advanced Encryption System (AES). Where ECC used generate private/public keys AES for decryption using generated keys. The works follows; it begins by inserting be encrypted which “lena.png” size 256*256 passing Algorithm along with public key. Then, in algorithm, key hashed then encrypt algorithm. On other hand, algorithm calculating use decrypt Finally, experimental results shows National Institute Standards Technology (NIST) test have better randomness than only histogram show pixels values distributed across all three channels R, G B. This step further get more against To further, Logistic chaotic map been comparison purposes terms randomness,
منابع مشابه
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication,wepropose a newapproach for image encryption basedon chaotic logisticmaps in order tomeet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic ...
متن کاملImage encryption using the two-dimensional logistic chaotic map
Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a se...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملEncryption of Image Using Chaotic Map
The advent of internet has paved the way for transmitting more and more information over the internet in a very less time and multimedia technology is also not untouched with it. Audio, images & other multimedia are being transmitted over the internet. The traditional encryption schemes appear not to be ideal for image applications, due to some intrinsic features of images such as bulk data cap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of interactive mobile technologies
سال: 2023
ISSN: ['1865-7923']
DOI: https://doi.org/10.3991/ijim.v17i10.38787