Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
ISSN : 2231 - 5403Journal from gdlhub / 2017-08-14 11:52:33
Oleh : R.Raja Kumar, A.Sampath and P.Indumathi, Computer Science & Information Technology
Dibuat : 2012-06-26, dengan 1 file
Keyword : Image Encryption, Security, Chaotic Map Lattice, Binary sequence, Key space.
Subjek : Enhancement and Analysis of Chaotic Image Encryption Algorithms
Url : http://Manish Sharma and Gurpadam Singh
Sumber pengambilan dokumen : Internet
The focus of this paper is to improve the level of security and secrecy provided by the chaotic
map based image encryption.An encryption algorithm based on the Logistic and the Henon
maps is proposed. The algorithm uses chaotic iteration to generate the encryption keys, and
then carries out the XOR and cyclic shift operations on the plain text to change the values of
image pixels. Chaotic Map Lattice based image encryption algorithm suggested by Pisarchik is
also examined which is based on Logistic map alone. In experiments, the corresponding results
showed the proposed method is a promising scheme for image encryption in terms of security
and secrecy. At the end, we show the results of a security analysis and a comparison of both
schemes.
The focus of this paper is to improve the level of security and secrecy provided by the chaotic
map based image encryption.An encryption algorithm based on the Logistic and the Henon
maps is proposed. The algorithm uses chaotic iteration to generate the encryption keys, and
then carries out the XOR and cyclic shift operations on the plain text to change the values of
image pixels. Chaotic Map Lattice based image encryption algorithm suggested by Pisarchik is
also examined which is based on Logistic map alone. In experiments, the corresponding results
showed the proposed method is a promising scheme for image encryption in terms of security
and secrecy. At the end, we show the results of a security analysis and a comparison of both
schemes.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | Computer Science & Information Technology |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- , Editor: fachruddin
Download...
Download hanya untuk member.
Jurnal 88]
File : Jurnal 88].PDF
(589283 bytes)