Paper Title:
An Image Encryption Method Based on Tent Chaotic Map in DCT Domain
  Abstract

In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper, the sequence was generated using chaotic system, combined with high efficiency and better security in transform domain. An image encryption method based on Tent chaotic map in DCT domain was proposed. The simulation results show that this method has characteristics such as high efficiency and good safety, and has a certain practicality and objectivity.

  Info
Periodical
Chapter
III. Related Enlightening Topics
Edited by
Fei Hu and Beibei Wang
Pages
456-460
DOI
10.4028/www.scientific.net/AMR.279.456
Citation
J. H. Song, Q. Ding, "An Image Encryption Method Based on Tent Chaotic Map in DCT Domain", Advanced Materials Research, Vol. 279, pp. 456-460, 2011
Online since
July 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Hong He, Hong Dong, Tong Yang, Lin He, Yi Wu
Abstract:In resent years, secure communication is becoming one of the study hotspot in information safety. Secure communication is a way of...
508
Authors: Xue Song Zhou, Man Li, You Jie Ma, Si Jia Liu
Chapter 8: Modeling, Analysis, and Simulation of Manufacturing Processes
Abstract:The chaos sequence generated by the chaotic map methods usually has unsatisfactory performances. To solve this problem, this paper proposes a...
2307
Authors: Xue Song Zhou, Man Li, You Jie Ma, Si Jia Liu
Chapter 18: Mechanical and Electronic Engineering Control
Abstract:The chaos sequence generated by the chaotic map methods usually has unsatisfactory performances. To solve this problem, this paper proposes a...
7607
Authors: Chuan Kuei Huang, Hsiau Hsian Nien, Shu Li Hsu, Siang Shang Tu
Chapter 4: Engineering Material, Energy Science and Dynamic System in Mechanical Engineering
Abstract:Due to rapid developments in computer networking and communi- cation technology, users have begun to use personal computers to transmit...
761
Authors: Chun Jiang Pang
Chapter 5: Information Processing and Computational Science
Abstract:This paper analyzes a sort of color still image algorithm based on the Logistic map sorting, and verifies the confidentiality. Further, this...
850