Chaotic image encryption design using Tompkins-Paige algorithm (Q1036462): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Import240304020342 (talk | contribs)
Set profile property.
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank

Revision as of 01:59, 5 March 2024

scientific article
Language Label Description Also known as
English
Chaotic image encryption design using Tompkins-Paige algorithm
scientific article

    Statements

    Chaotic image encryption design using Tompkins-Paige algorithm (English)
    0 references
    0 references
    13 November 2009
    0 references
    Summary: We present a new permutation-substitution image encryption architecture using chaotic maps and Tompkins-Paige algorithm. The proposed encryption system includes two major parts, chaotic pixels permutation and chaotic pixels substitution. A logistic map is used to generate a bit sequence, which is used to generate pseudorandom numbers in Tompkins-Paige algorithm, in 2D permutation phase. Pixel substitution phase includes two process, the tent pseudorandom image generator and modulo addition operation. All parts of the proposed chaotic encryption system are simulated. Uniformity of the histogram of the proposed encrypted image is justified using the chi-square test, which is less than \(\chi^{2}(255, 0.05)\). The vertical, horizontal, and diagonal correlation coefficients, as well as their average and RMS values for the proposed encrypted image are calculated that is about 13\% less than previous researches. To quantify the difference between the encrypted image and the corresponding plain-image, three measures are used. These are MAE, NPCR, and UACI, which are improved in our proposed system considerably. NPCR of our proposed system is exactly the ideal value of this criterion. The key space of our proposed method is large enough to protect the system against any Brute-force and statistical attacks.
    0 references
    permutation-substitution image encryption architecture
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references