2012
DOI: 10.5923/j.computer.20120205.06
|View full text |Cite
|
Sign up to set email alerts
|

New Chaos-Based Image Encryption Scheme for RGB Components of Color Image

Abstract: The widely use of data digitization leads to the necessity of hiding the content of a message when it enters an insecure channel. The message prepared by the sender is encrypted before transmission. The encryption process requires an encryption algorithm and a key. In image cryptography, recently numbers of effective chaos-based image encryption schemes have been proposed. This paper presents a novel image encryption scheme which encrypts the pixels' RGB component instead of the pixels itself, where every pixe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…Steganography is one of the encryptions methods that have been used in image cryptography in the last two (2) decades and in particular on watermarking [16]. The classical image encryption such as Data Encryption Standard (DES), RSA, and ADS are designed with good confusion and diffusion [17], but it has the weakness of low-level of efficiency because of the huge size and noticeable redundancy of image data [3], [18]. Due to the big size of image data, the implementation of images cryptosystems is carried out in spatial domain, frequency domain or hybrid domains of the plain images.…”
Section: Image Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…Steganography is one of the encryptions methods that have been used in image cryptography in the last two (2) decades and in particular on watermarking [16]. The classical image encryption such as Data Encryption Standard (DES), RSA, and ADS are designed with good confusion and diffusion [17], but it has the weakness of low-level of efficiency because of the huge size and noticeable redundancy of image data [3], [18]. Due to the big size of image data, the implementation of images cryptosystems is carried out in spatial domain, frequency domain or hybrid domains of the plain images.…”
Section: Image Cryptographymentioning
confidence: 99%
“…In addition, there are several drawbacks and weakness such as the requirement for powerful computing system and highly computational time, thus the implementation of these techniques cause low level of efficiency and it cannot guarantee data confidentiality and security [2]. Encrypting images that are sent over various communications channels has become one of the most important processes of most of the current applications and fields, such as military, educational, medical, industrial and social media [3], [4]. Image encryption can be defined as the use of set of process called algorithm to convert the plain image into a ciphered image in such a way that no one can recover it except for the sender and the intended recipient [2] [5].…”
Section: Introductionmentioning
confidence: 99%
“…Each pixel/element of color image component/matrix component is represented by 8 bits binary digit [0/1]. Then, a diffusion operation is performed to produce cipher image C with components as[14]…”
mentioning
confidence: 99%
“…Image cryptography is being done by other methods also [15,16,17]. In [17], a chaos based image encryption method has been proposed. The key image has been genereated from a given initial key image using the same encryption method several times to produce randomness in the key image.…”
Section: Introductionmentioning
confidence: 99%
“…Cellular automata is also being used largely in image cryptography [8,9], visual cryptography [10,11,12] and in image processing [13,14]. Image cryptography is being done by other methods also [15,16,17]. In [17], a chaos based image encryption method has been proposed.…”
Section: Introductionmentioning
confidence: 99%