National Changhua University of Education Institutional Repository : Item 987654321/13838
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 6507/11669
Visitors : 29725424      Online Users : 558
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Adv. Search
LoginUploadHelpAboutAdminister

Please use this identifier to cite or link to this item: http://ir.ncue.edu.tw/ir/handle/987654321/13838

Title: Hybrid Image Encryption Using Multi-Chaos-System
Authors: Nien, H. H.;Huang, Wei-Tzer;Chen, S. C.;Liu, C. H.;Wu, S. Y.;Tian, Y. R.;Huang, C. K.;Hsu, Y. H.
Contributors: 工業教育與技術學系
Keywords: Bit-Chaotic-Rearrangement;Chaos-based;Encryption;Hybrid;Pixel shuffle
Date: 2009-12
Issue Date: 2012-08-27T11:01:55Z
Publisher: IEEE
Abstract: As a result of the development of computer network technology, communication of information through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. Therefore the communication security is now an important issue for multimedia communications. This paper proposed a hybrid encryption technique for the color image based on the multichaotic-system which combines Pixel-Chaotic-Shuffle (PCS) and Bit-Chaotic-Rearrangement (BCR). The idea of applying chaos theory on image encryption is because of the behavior of chaos system exhibiting nonlinear dynamics and sensitivity to initial conditions. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. In this paper, the pixels of plain image are firstly disarrayed by PCS, and then their bits are rearranged using BCR. This method increases the key space of images, completely eradicates the outlines of the encrypted images, blurs the distribution characteristics of RGB-level matrices, and effectively protects against the decryption of exhaustive attack method. The test methods involving key space and correlation coefficient r are adopted for the security analysis. Eventually, empirical images are adopted as examples to prove the great encryption performance of the proposed method and also the good potential for practical applications in image encryption.
Relation: the Seventh International Conference on Information, Communications and Signal Processing (ICICS 2009), Dec. 8-10, 2009
Appears in Collections:[Department of Industrial Education and Technology] Proceedings

Files in This Item:

File SizeFormat
index.html0KbHTML723View/Open


All items in NCUEIR are protected by copyright, with all rights reserved.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback