Paper Title:
Design of an Images Security System
  Abstract

The paper designs an image security system. It includes four parts: keys generation, permutation, diffusion and decryption. Using six decimal numbers as the key, it can get three new keys: key1, key2 and key3 from the origin key in keys generation. The permutation used a new chaotic map to shuffles the image pixels by key1 and key2. The diffusion used the logistic map to flat the histogram of the ciphered image. The key3 is the parameters of the logistic map. The results of simulation show the validity of security system. Analysis shows that it can be used in real-time image encryption applications with high speed.

  Info
Periodical
Edited by
Shengyi Li, Yingchun Liu, Rongbo Zhu, Hongguang Li, Wensi Ding
Pages
1735-1738
DOI
10.4028/www.scientific.net/AMM.34-35.1735
Citation
F. Huang, X. P. Liu, "Design of an Images Security System", Applied Mechanics and Materials, Vols. 34-35, pp. 1735-1738, 2010
Online since
October 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Feng Huang, Xiang Jun Ouyang, Xing Ping Liu
Abstract:The paper analyzes a symmetric image encryption scheme based on a new chaotic two-dimensional map. The map can encrypt image. The numbers of...
293
Authors: Feng Huang, Zhong Ming Pan
Abstract:Sensors are used more and more widely today. It can get valuable images through multi-sensor fusion technology. The paper designs an image...
297
Authors: Yu Chen
Chapter 14: Power and Fluid Machinery
Abstract:Information security in Electronic commerce is a very important, and image is one of the important information. Classic image encryption...
2908
Authors: Jin Qiu, Ping Wang
Chapter 7: Other Related Topics
Abstract:In this paper, a chaos-based image encryption scheme with stream cipher structure is proposed. The key component of the encryption system is...
1800
Authors: Peng Cheng, Huai Xun Zhao
Chapter 5: Signal and Image Processing, Intelligent Recognition, Intelligent Algorithms and Methods, Сomputational Mathematics
Abstract:This paper introduces a novel image encryption scheme based on chaotic maps and toggle cellular automata (TCA). In confusion stage, the...
797