tailieunhanh - Novel chaotic system for color image encryption using random permutation
There are various encryption methods to secure image from unauthorized parties. This paper is an implementation of a color image encryption algorithm based on a novel three dimensional chaotic system using a random permutation technique. | International Journal of Computer Networks and Communications Security C VOL. 6, NO. 1, JANUARY 2018, 9–16 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) N C S Novel Chaotic System for Color Image Encryption Using Random Permutation S. N. Lagmiri1, N. Elalami2 and J. Elalami3 1 Information and Production System, Mohammadia School Engineering, Mohamed V University in Rabat, Morocco 2 3 LAII, Mohammadia School Engineering, Mohamed V University in Rabat, Morocco LASTIMI, Higher School of Technology of Sale, Mohamed V University in Rabat, Morocco 1 , 2prelalami@, 3alamijamila1@ ABSTRACT The recent researches of image encryption algorithms have been more and more interested to combine the encryption methods and the complex behavior of chaotic signals, in order to reach higher security performance. A digital image can be represented by two dimensional arrays which have numeric value called pixel, and can be encrypted by various combination of those pixels. There are various encryption methods to secure image from unauthorized parties. This paper is an implementation of a color image encryption algorithm based on a novel three dimensional chaotic system using a random permutation technique. Keywords: Encryption, Decryption, Chaotic System, Permutation, Histogram, Correlation Coefficient. 1 INTRODUCTION With the ever-increasing growth development of image transmission through computer networks, especially the Internet, the security of digital images has become more important. So it is necessary to encrypt image data before transmission over the network to preserve its security and prevent unauthorized access. Image encryption techniques try to convert original image to another image that is hard to understand; to keep the image confidential between users, in other word, it is essential that nobody could get to know the content without a key for decryption. In recent years, .
đang nạp các trang xem trước