{"title":"Extended Baker map using Scan patterns for image encryption","authors":"Pham Anh Hung, P. Sooraksa, K. Klomkarn","doi":"10.1109/ICITEED.2013.6676223","DOIUrl":null,"url":null,"abstract":"In this paper, an improvement on free-size image encryption scheme using Baker map combining Scan patterns is proposed. The generalized discrete chaotic Baker map uses sequences of parameters generated by chaotic Gauss map to divide image matrix into boxes. Scrambling method is done by using Scan patterns in each boxes of chaotic Baker map. After scrambling method, chaotic 3-D Chen system is selected to do the pixel transformation. Through the experiments, the security of proposed scheme is tested by introducing keys analysis, entropy analysis, statistical analysis, and processing time so that the scheme achieves high encryption efficiency.","PeriodicalId":204082,"journal":{"name":"2013 International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Information Technology and Electrical Engineering (ICITEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITEED.2013.6676223","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper, an improvement on free-size image encryption scheme using Baker map combining Scan patterns is proposed. The generalized discrete chaotic Baker map uses sequences of parameters generated by chaotic Gauss map to divide image matrix into boxes. Scrambling method is done by using Scan patterns in each boxes of chaotic Baker map. After scrambling method, chaotic 3-D Chen system is selected to do the pixel transformation. Through the experiments, the security of proposed scheme is tested by introducing keys analysis, entropy analysis, statistical analysis, and processing time so that the scheme achieves high encryption efficiency.