Loading...
Please wait, while we are loading the content...
Similar Documents
Intertwining Chaotic Maps Based Image Encryption
| Content Provider | Semantic Scholar |
|---|---|
| Abstract | 5.1 INTRODUCTION In any communication system, including the satellite and the Internet, it is almost impossible to prevent unauthorized people from eavesdropping. When information is broadcast from a satellite or transmitted through the Internet, there is a risk of information interception. Security of image and video data has become increasingly important for many applications, including video conferencing, secure facsimile, medical and military applications. Most chaotic image encryptions or encryption systems use the permutation substitution architecture. These two processes are repeated for several rounds, to obtain the final encrypted image. Fridrich (1998) suggested a chaotic image encryption method composed of permutation and substitution. All the pixels are moved using a 2D chaotic map. The new pixels moved to the current position are taken as a permutation of the original pixels. In the substitution process, the pixel values are altered sequentially. Chen et al (2004) employed a three dimensional 3D Arnold cat map and a 3D Baker map in the permutation stage. Lian et al (2005) used a chaotic standard map in the permutation stage and a quantized logistic map in the substitution stage. The cryptanalysis techniques on chaotic maps have also been attempted in recent |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://shodhganga.inflibnet.ac.in/bitstream/10603/25696/10/10_chapter5.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |