Design of an Images Security System

Article Preview

Abstract:

The paper designs an image security system. It includes four parts: keys generation, permutation, diffusion and decryption. Using six decimal numbers as the key, it can get three new keys: key1, key2 and key3 from the origin key in keys generation. The permutation used a new chaotic map to shuffles the image pixels by key1 and key2. The diffusion used the logistic map to flat the histogram of the ciphered image. The key3 is the parameters of the logistic map. The results of simulation show the validity of security system. Analysis shows that it can be used in real-time image encryption applications with high speed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1735-1738

Citation:

Online since:

October 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S.S. Maniccam, N.G. Bourbkis: Pattern Recognition. Vol. 37(2003), pp.725-737.

Google Scholar

[2] L. Kocarev: IEEE Circuits and System Magazine. Vo1. 3(2001), pp.6-21.

Google Scholar

[3] Fridrich: Int J Bifurcat Chaos. Vol. 8(1998), pp.1259-1284.

Google Scholar

[4] Guanrong Chen, Yaobin Mao, and Charles K Chui: Chaos Solitons and Fractals, Vol. 21(2004), pp.749-761.

Google Scholar

[5] Y. Mao, G. Chen and S. Lian: Int J Bifurcat Chaos, Vol. 14(2004), pp.3613-3624.

Google Scholar