Scale Invariant Digital Color Image Encryption Using a 3D Modular Chaotic Map

نویسندگان

چکیده

Cryptography is one of the most important security mechanisms for transmission digital media on Internet. Most proposed cryptographic image methods based chaotic maps are dependent upon sizes and them worked square images. In this paper tackling problem, a scale-invariant color encryption method in three-dimensional space presented. At first, two-dimensional converted into space, case, red, green, blue spectrums divided set gray-level sub-images. Then, to have confusion diffusion properties, 3D substitution permutation operation performed operations, pixel values sub-images changed with help XOR circular shift operators appropriate keys. operation, position pixels using modular chaos mappings. To permutation, or more windows equal size, then map operations each window separate Depending number sub-images, there may be two last that overlapping. increase speed encryption, steps can implemented parallel. The approach relative similar algorithms increases key improves standard parameters, such as entropy, sensitivity, adjacent correlations, histogram uniformity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Approach for Fast Color Image Encryption Using Chaotic Map

Image encryption using chaotic maps has been established a great way. The study shows that a number of functional architecture has already been proposed that utilize the process of diffusion and confusion. However, permutation and diffusion are considered as two separate stages, both requiring image-scanning to obtain pixel values. If these two stages are mutual, the duplicate scanning effort c...

متن کامل

Color Image Encryption using 3D Chaotic Map with AES key Dependent S-Box

Techniques in encrypting digital images play a crucial role in the prevention of unauthorized access. This paper focuses on color image encryption and decryption using 3D chaotic map with AES key dependent S-Boxes. It contains four major parts which are Exclusive X-or forward and backward, 3D Logistic Map, 3D Chebyshev map, and 2D Arnold Cat Map, and Dynamic S-box of AES. Here, Exclusive X-or i...

متن کامل

Encryption of Image Using Chaotic Map

The advent of internet has paved the way for transmitting more and more information over the internet in a very less time and multimedia technology is also not untouched with it. Audio, images & other multimedia are being transmitted over the internet. The traditional encryption schemes appear not to be ideal for image applications, due to some intrinsic features of images such as bulk data cap...

متن کامل

Image encryption using chaotic logistic map

In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication,wepropose a newapproach for image encryption basedon chaotic logisticmaps in order tomeet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic ...

متن کامل

A new image encryption method using chaotic map

Nowadays, using transfer information includes images has increased due to increasing use of computer demands. Chaos-based image encryption method is one of the most efficient methods which is used to hide visual information during transmission. This paper presents a new image encryption method based on Logistic and Tent chaotic maps and permutation-diffusion architecture, in which, chaotic maps...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3096224