2009 ISECS International Colloquium on Computing, Communication, Control, and Management 2009
DOI: 10.1109/cccm.2009.5267545
|View full text |Cite
|
Sign up to set email alerts
|

A new method of information encryption

Abstract: Aiming at high fidelity image only can be encrypted in time domain ,summarize the current all kind of encryption methods in time domain .That are only chaos permutation, only chaos encryption and hybrid encryption algorithm. Then, this paper proposed the block chaos image scrambling and chaos encryption with after effect .In the block permutation, give the formular of correlation and compare the correlation before and after permutation. After the hybrid encryption, computing the information entropy of encrypte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…In [9], the author proposes a bit-level encryption system based on one-dimensional chaos theory, which converts the pixel values of images into binary, and uses a Logistic map to generate chaotic sequences to scramble and encrypt them. In [10], chaotic sequence generated by Logistic map was used to scramble pixel positions of the segmented images, so as to achieve the purpose of image encryption. [11] proposed an image encryption algorithm based on Logistic mapping, which mainly used ''scrambling-diffusion'' and multiple iterations to encrypt the image.…”
Section: Introductionmentioning
confidence: 99%
“…In [9], the author proposes a bit-level encryption system based on one-dimensional chaos theory, which converts the pixel values of images into binary, and uses a Logistic map to generate chaotic sequences to scramble and encrypt them. In [10], chaotic sequence generated by Logistic map was used to scramble pixel positions of the segmented images, so as to achieve the purpose of image encryption. [11] proposed an image encryption algorithm based on Logistic mapping, which mainly used ''scrambling-diffusion'' and multiple iterations to encrypt the image.…”
Section: Introductionmentioning
confidence: 99%
“…Yuan and Xu [30,33] proposed to encrypt the image using a symmetric encryption scheme such as the chaos-based technique or one-time pad and distribute the encrypted image with the key to different participants. However, the shares should be the same size as the original image.…”
Section: Past Work On Sismentioning
confidence: 99%
“…Any encryption method is divided into two main steps [6,8,18,22,30,34], shuffling and replacement, to change the positions of pixels and to change the values of pixels, respectively. Therefore, the use of two methods achieves high system performance and yields better image results.…”
Section: Size Testmentioning
confidence: 99%
“…Since Matthews [7] published his first algorithm of encryption in 1989, which depended on some chaotic characteristics, a number of chaos-based image encryption schemes with have been developed in literature. For instance, in [8], the authors created a cipher image by dividing it into some blocks and used some kind of permutations applied to each block using the logistic map. A two-dimensional discrete chaotic system has been introduced in [9].…”
Section: Introductionmentioning
confidence: 99%