A Novel Image Encryption Based On Hyper Chaotic With Duplex Technique Encryption

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 692

فایل این مقاله در 6 صفحه با فرمت PDF و WORD قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CITCOMP01_225

تاریخ نمایه سازی: 16 شهریور 1395

چکیده مقاله:

The security has become an increasingly importance in today’s application of information technology. During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. Images often carry much information that may include private data. To assure the information is transferred safely and securely, image encryption approaches are of great importance. This paper presented an image encryption approach that uses chaotic systems with Duplex Technique encryption based on three chaotic systems. Shuffling process is used logistic map. The encryption process is accomplished in a structure Duplex Technique by adopting three chaotic systems consisting Lorenz, Chen, and Lu. The simulations concluded to very promising result that shows the effectiveness of the approach in Image encryption.

نویسندگان

Ziba Dehghani

Department of Electrical and Computer Engineering, Kazerun Branch, Islamic Azad University, Kazerun, Iran

Hassan Masoumi

Department of Electrical and Computer Engineering, Kazerun Branch, Islamic Azad University, Kazerun, Iran

Mehdi Taghizadeh

Department of Electrical and Computer Engineering, Kazerun Branch, Islamic Azad University, Kazerun, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Wang XTeng L, Qin . (2012) .A novel colour image ...
  • Liu H, Wang X. (2011) .Color image encryption using spatial ...
  • Wang Q, Guo Q, Zhou J. (2012).Double image encryption based ...
  • WangY, Quan C, Tay C J. (20 14).Nonlinear multiple-image encryption ...
  • Ping P, Xu F, Wang Z. (2014) .Image encryption based ...
  • Wang X, Gu S, ZhangY. (2015). Nove] image encryption algorithm ...
  • Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF. ...
  • Tang Z, Zhang X, Lan W. (2015). Efficient image encryption ...
  • Wang L, Song H, Liu P. (2016). A _ hybrid ...
  • Hu H, Liu L, Ding N. (2013). Pseudo random sequence ...
  • G. Chen, et al., (2004) _ A symmetric image encryption ...
  • WangX, Zhang Y, Bao X. (2015). A novel chaotic image ...
  • XuL, Li Z, Li J., Hua Xu L, Li Z, ...
  • Zhu L, Li W, LiaoL , Li H.(2006). A nove] ...
  • Tang Z, Zhang X. (2011). Secure image encryption without size ...
  • Tang Z, Lu X, Wei W, Wang S. (2007). Image ...
  • Martin K, Lukac R, Plataniotis KN. (2005) .Efficient encryption of ...
  • Lin Q, Yin F, Mei T, Liang H. (2008) .A ...
  • Liu H, Wang X. (2010) .Color image encryption based _ ...
  • Wang X, Yang L, Liu R, Kadir A. (2010) .A ...
  • C.E. Shannon, (1949) C ommunication theory of secrecy systems, Bell ...
  • نمایش کامل مراجع