A chaotic encryption algorithm for image privacy based on two pseudorandomly enhanced logistic maps

MA Murillo-Escobar, MO Meranza-Castillón… - … Security Using Chaotic …, 2020 - Springer
Multimedia Security Using Chaotic Maps: Principles and Methodologies, 2020Springer
Chaos-based cryptography has become in an interesting research topic in secure
communications during last years, since chaos is strongly related with cryptography to
design fast and secure cryptosystems for bulk and correlated data such as digital images.
On the other hand, improve randomness of chaotic stream is desirable to enhance the
security of the encryption, since such stream is used as main source for diffusion and
confusion process in a cryptosystem. In this chapter, we introduce a chaotic encryption …
Abstract
Chaos-based cryptography has become in an interesting research topic in secure communications during last years, since chaos is strongly related with cryptography to design fast and secure cryptosystems for bulk and correlated data such as digital images. On the other hand, improve randomness of chaotic stream is desirable to enhance the security of the encryption, since such stream is used as main source for diffusion and confusion process in a cryptosystem. In this chapter, we introduce a chaotic encryption algorithm by using two pseudorandomly enhanced logistic maps (PELM) for color RGB image privacy. Experimental results with computer simulations at MATLAB are realized to validate the effectiveness, security, and performance of proposed scheme. Based on results, the propose RGB image cryptosystem is secure and speed to be used in applications such as in biometric systems, telemedicine, or satelital image in military affairs.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果