A secure image encryption scheme based on chaotic maps and affine transformation
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahmad, Jawad | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.available | 2020-07-10T05:46:06Z | - |
dc.date.created | 2020-07-06 | - |
dc.date.issued | 2016-11 | - |
dc.identifier.issn | 1380-7501 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/7203 | - |
dc.description.abstract | Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement, which is an essential concern in many secure data applications. In this paper, an efficient chaos-based image encryption scheme with higher key space is presented. Even with a single round of encryption, a significantly larger key space can be achieved. The proposed scheme removes correlation among image pixels via random chaotic sequences, simply by XOR and addition operations. In order to resist against numerous attacks, we apply the affine transformation to get the final ciphertext image. The security of the proposed scheme is proved through histogram, contrast, PSNR, entropy, correlation, key space, key sensitivity and differential attack analysis. Many significant properties of chaotic maps, sensitivity to initial condition and control parameters, structure and attack complexity, make the anticipated scheme very reliable, practical and robust in various secure communication applications. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | S-BOX | - |
dc.subject | ALGORITHM | - |
dc.subject | CRYPTANALYSIS | - |
dc.subject | EFFICIENT | - |
dc.subject | IMPROVEMENT | - |
dc.title | A secure image encryption scheme based on chaotic maps and affine transformation | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.identifier.doi | 10.1007/s11042-015-2973-y | - |
dc.identifier.scopusid | 2-s2.0-84944705072 | - |
dc.identifier.wosid | 000386776800050 | - |
dc.identifier.bibliographicCitation | MULTIMEDIA TOOLS AND APPLICATIONS, v.75, no.21, pp.13951 - 13976 | - |
dc.relation.isPartOf | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.title | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.volume | 75 | - |
dc.citation.number | 21 | - |
dc.citation.startPage | 13951 | - |
dc.citation.endPage | 13976 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | S-BOX | - |
dc.subject.keywordPlus | ALGORITHM | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordPlus | IMPROVEMENT | - |
dc.subject.keywordAuthor | Chaotic maps | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Key space | - |
dc.subject.keywordAuthor | TD-ERCS map | - |
dc.subject.keywordAuthor | PWLCM | - |
dc.subject.keywordAuthor | Image encryption | - |
dc.subject.keywordAuthor | Affine transformation | - |
dc.subject.keywordAuthor | Security analysis | - |
dc.subject.keywordAuthor | Secure communication | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.