Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Security analysis of image cryptosystems only or partially based on a chaotic permutation
Journal of Systems and Software
Computers & Mathematics with Applications
Hi-index | 0.09 |
With the large-scale development in satellite and network communication technologies, there is a great demand for preserving the secure storage and transmission of satellite imagery over internet and shared network environment. This brings new challenges to protect sensitive and critical satellite images from unauthorized access and illegal usage. In this paper, we address the aforementioned issues and develop techniques to eliminate the associated problems. To achieve this, we propose a new chaos-based symmetric-key encryption technique for satellite imagery. This scheme utilizes multiple chaotic maps e.g. Logistic, Henon, Tent, Cubic, Sine and Chebyshev for enhancing the key space, robustness and security of satellite imagery. We perform key sensitivity, statistical and performance analysis experiments to determine the security, reliability, and speed of our algorithm for satellite imagery. The proposed algorithm presents several interesting features, such as a high level of security, large enough key space, pixel distributing uniformity and an acceptable encryption speed as compared to AES, 3-DES, and DES.