Mixed chaotic maps based encryption for high crypto secrecy
Title | Mixed chaotic maps based encryption for high crypto secrecy |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Arivazhagan, S., Jebarani, W. S. L., Kalyani, S. V., Abinaya, A. Deiva |
Conference Name | 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) |
Date Published | March 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5090-4740-6 |
Keywords | chaos, chaos based image encryption technique, chaotic communication, chaotic cryptography, composability, cryptographic algorithms, cryptography, Elliptic curve cryptography, Encryption, high crypto secrecy, image processing, initial conditions, Logistics, Metrics, mixed chaotic maps, pubcrawl, Resiliency, secure image encryption, secure image encryption techniques, simple chaotic maps, Standards, statistical analysis, Substitution, Transposition |
Abstract | In recent years, the chaos based cryptographic algorithms have enabled some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a new approach for image encryption based on chaotic maps in order to meet the requirements of secure image encryption. The chaos based image encryption technique uses simple chaotic maps which are very sensitive to original conditions. Using mixed chaotic maps which works based on simple substitution and transposition techniques to encrypt the original image yields better performance with less computation complexity which in turn gives high crypto-secrecy. The initial conditions for the chaotic maps are assigned and using that seed only the receiver can decrypt the message. The results of the experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for image encryption. |
URL | https://ieeexplore.ieee.org/document/8085697 |
DOI | 10.1109/ICSCN.2017.8085697 |
Citation Key | arivazhagan_mixed_2017 |
- Logistics
- Transposition
- Substitution
- statistical analysis
- standards
- simple chaotic maps
- secure image encryption techniques
- secure image encryption
- Resiliency
- pubcrawl
- mixed chaotic maps
- Metrics
- chaos
- initial conditions
- Image Processing
- high crypto secrecy
- encryption
- Elliptic curve cryptography
- Cryptography
- cryptographic algorithms
- composability
- chaotic cryptography
- chaotic communication
- chaos based image encryption technique