Design of an Images Security System

Abstract:

Article Preview

The paper designs an image security system. It includes four parts: keys generation, permutation, diffusion and decryption. Using six decimal numbers as the key, it can get three new keys: key1, key2 and key3 from the origin key in keys generation. The permutation used a new chaotic map to shuffles the image pixels by key1 and key2. The diffusion used the logistic map to flat the histogram of the ciphered image. The key3 is the parameters of the logistic map. The results of simulation show the validity of security system. Analysis shows that it can be used in real-time image encryption applications with high speed.

Info:

Periodical:

Edited by:

Shengyi Li, Yingchun Liu, Rongbo Zhu, Hongguang Li, Wensi Ding

Pages:

1735-1738

DOI:

10.4028/www.scientific.net/AMM.34-35.1735

Citation:

F. Huang and X. P. Liu, "Design of an Images Security System", Applied Mechanics and Materials, Vols. 34-35, pp. 1735-1738, 2010

Online since:

October 2010

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.