National Changhua University of Education Institutional Repository : Item 987654321/13838
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 6491/11663
造访人次 : 24503276      在线人数 : 69
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 进阶搜寻

jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://ir.ncue.edu.tw/ir/handle/987654321/13838

题名: Hybrid Image Encryption Using Multi-Chaos-System
作者: Nien, H. H.;Huang, Wei-Tzer;Chen, S. C.;Liu, C. H.;Wu, S. Y.;Tian, Y. R.;Huang, C. K.;Hsu, Y. H.
贡献者: 工業教育與技術學系
关键词: Bit-Chaotic-Rearrangement;Chaos-based;Encryption;Hybrid;Pixel shuffle
日期: 2009-12
上传时间: 2012-08-27T11:01:55Z
出版者: IEEE
摘要: As a result of the development of computer network technology, communication of information through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. Therefore the communication security is now an important issue for multimedia communications. This paper proposed a hybrid encryption technique for the color image based on the multichaotic-system which combines Pixel-Chaotic-Shuffle (PCS) and Bit-Chaotic-Rearrangement (BCR). The idea of applying chaos theory on image encryption is because of the behavior of chaos system exhibiting nonlinear dynamics and sensitivity to initial conditions. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. In this paper, the pixels of plain image are firstly disarrayed by PCS, and then their bits are rearranged using BCR. This method increases the key space of images, completely eradicates the outlines of the encrypted images, blurs the distribution characteristics of RGB-level matrices, and effectively protects against the decryption of exhaustive attack method. The test methods involving key space and correlation coefficient r are adopted for the security analysis. Eventually, empirical images are adopted as examples to prove the great encryption performance of the proposed method and also the good potential for practical applications in image encryption.
關聯: the Seventh International Conference on Information, Communications and Signal Processing (ICICS 2009), Dec. 8-10, 2009
显示于类别:[工業教育與技術學系] 會議論文

文件中的档案:

档案 大小格式浏览次数
index.html0KbHTML558检视/开启


在NCUEIR中所有的数据项都受到原著作权保护.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈