Detailed Information

Cited 17 time in webofscience Cited 80 time in scopus
Metadata Downloads

A secure image encryption scheme based on chaotic maps and affine transformation

Full metadata record
DC Field Value Language
dc.contributor.authorAhmad, Jawad-
dc.contributor.authorHwang, Seong Oun-
dc.date.available2020-07-10T05:46:06Z-
dc.date.created2020-07-06-
dc.date.issued2016-11-
dc.identifier.issn1380-7501-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/7203-
dc.description.abstractDue to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement, which is an essential concern in many secure data applications. In this paper, an efficient chaos-based image encryption scheme with higher key space is presented. Even with a single round of encryption, a significantly larger key space can be achieved. The proposed scheme removes correlation among image pixels via random chaotic sequences, simply by XOR and addition operations. In order to resist against numerous attacks, we apply the affine transformation to get the final ciphertext image. The security of the proposed scheme is proved through histogram, contrast, PSNR, entropy, correlation, key space, key sensitivity and differential attack analysis. Many significant properties of chaotic maps, sensitivity to initial condition and control parameters, structure and attack complexity, make the anticipated scheme very reliable, practical and robust in various secure communication applications.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectS-BOX-
dc.subjectALGORITHM-
dc.subjectCRYPTANALYSIS-
dc.subjectEFFICIENT-
dc.subjectIMPROVEMENT-
dc.titleA secure image encryption scheme based on chaotic maps and affine transformation-
dc.typeArticle-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.identifier.doi10.1007/s11042-015-2973-y-
dc.identifier.scopusid2-s2.0-84944705072-
dc.identifier.wosid000386776800050-
dc.identifier.bibliographicCitationMULTIMEDIA TOOLS AND APPLICATIONS, v.75, no.21, pp.13951 - 13976-
dc.relation.isPartOfMULTIMEDIA TOOLS AND APPLICATIONS-
dc.citation.titleMULTIMEDIA TOOLS AND APPLICATIONS-
dc.citation.volume75-
dc.citation.number21-
dc.citation.startPage13951-
dc.citation.endPage13976-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusS-BOX-
dc.subject.keywordPlusALGORITHM-
dc.subject.keywordPlusCRYPTANALYSIS-
dc.subject.keywordPlusEFFICIENT-
dc.subject.keywordPlusIMPROVEMENT-
dc.subject.keywordAuthorChaotic maps-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorKey space-
dc.subject.keywordAuthorTD-ERCS map-
dc.subject.keywordAuthorPWLCM-
dc.subject.keywordAuthorImage encryption-
dc.subject.keywordAuthorAffine transformation-
dc.subject.keywordAuthorSecurity analysis-
dc.subject.keywordAuthorSecure communication-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE