Chaos-Based Image Encryption Algorithm Using Decomposition

The proposed chaos-based image encryption algorithm consists of four stages: decomposition, shuffle, diffusion and combination. Decomposition is that an original image is decomposed to components according to some rule. The purpose of the shuffle is to mask original organization of the pixels of the...

Full description

Saved in:
Bibliographic Details
Main Authors: Deng, Hongyao (Author), Song, Xiuli (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2014-01-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02078 am a22002773u 4500
001 ijeecs3037_1045
042 |a dc 
100 1 0 |a Deng, Hongyao  |e author 
100 1 0 |e contributor 
700 1 0 |a Song, Xiuli  |e author 
245 0 0 |a Chaos-Based Image Encryption Algorithm Using Decomposition 
260 |b Institute of Advanced Engineering and Science,   |c 2014-01-01. 
520 |a The proposed chaos-based image encryption algorithm consists of four stages: decomposition, shuffle, diffusion and combination. Decomposition is that an original image is decomposed to components according to some rule. The purpose of the shuffle is to mask original organization of the pixels of the image, and the diffusion is to change their values. Combination is not necessary in the sender. To improve the efficiency, the parallel architecture is taken to process the shuffle and diffusion. To enhance the security of the algorithm, firstly, a permutation of the labels is designed. Secondly, two Logistic maps are used in diffusion stage to encrypt the components. One map encrypts the odd rows of the component and another map encrypts the even rows. Experiment results and security analysis demonstrate that the encryption algorithm not only is robust and flexible, but also can withstand common attacks such as statistical attacks and differential attacks. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3018 
540 |a Copyright (c) 2013 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 1: January 2014; 575-583 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v12.i1 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3037/1045 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3037/1045  |z Get fulltext