Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A New Approach for Image Encryption Using Chaotic Logistic Map
ICACTE '08 Proceedings of the 2008 International Conference on Advanced Computer Theory and Engineering
An Encryption Algorithm Based on Transformed Logistic Map
NSWCTC '09 Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02
An Improved Colour Image Encryption Based on Chaotic Map and OCML Model
NSWCTC '09 Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01
Analysis on an Image Encryption Algorithm
ETTANDGRS '08 Proceedings of the 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing - Volume 01
Dynamic substitution and diffusion based image encryption using modified logistic map
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Chaos-Based selective encryption for AVS video coding standard
PCM'12 Proceedings of the 13th Pacific-Rim conference on Advances in Multimedia Information Processing
Hi-index | 0.00 |
In this paper, a novel secure cryptosystem is proposed for direct encryption of color images, based on transformed logistic maps. The proposed cipher provides good confusion and diffusion properties that ensures extremely high security due to the mixing of colors pixels. The encryption scheme makes use of six odd secret keys and chaotic keys for each operation. The operations include initial permutation of all pixels with six odd keys, nonlinear diffusion using first chaotic key, xoring the second chaotic key with resultant values and zig-zag diffusion with third chaotic key. The proposed scheme supports key sizes ranging from 192 to 400 bits. The security and performance of the proposed image encryption technique have been analysed thoroughly using statistical analysis, key sensitivity analysis, differential analysis, key space analysis, entropy analysis and performance analysis. Results of the various types of analyses are showing that the proposed image encryption technique is more secure and fast and hence suitable for the real-time applications.