Sandeep Draksharam, Dheeraj Katravulapalli, K. Rohith Krishna, V. Thanikaiselvan
{"title":"混合混沌图像加密分析","authors":"Sandeep Draksharam, Dheeraj Katravulapalli, K. Rohith Krishna, V. Thanikaiselvan","doi":"10.1109/ICECA.2018.8474807","DOIUrl":null,"url":null,"abstract":"The Internet advances in the past decade have been upping at a tremendous pace; especially in the fields like medicine, military, and technology, where lot of internet threats have also been raising, at least at the same rate, if not higher. The communication takes place in the form of text, image, voice, and video signals etc. And we deal with more image-based applications. There are many encryption techniques existing-DES, AES, RSA, etc. but they provide less security and are vulnerable to brute force attacks due to factors like small key space, to avoid which, chaos-based encryption was introduced. Chaotic systems are very sensitive to initial conditions and distort the image to beyond reversible state, except with a protection key with which it is encrypted, which is hard to find in such a large key space. In this paper we will discuss image encryption using combined chaos by combining various chaotic maps like logistics map, singer map, tent map, sine map, piecewise map etc. and attempt to compare the results for better combination for encryption.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Analysis of Hybrid Chaotic Image Encryption\",\"authors\":\"Sandeep Draksharam, Dheeraj Katravulapalli, K. Rohith Krishna, V. Thanikaiselvan\",\"doi\":\"10.1109/ICECA.2018.8474807\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet advances in the past decade have been upping at a tremendous pace; especially in the fields like medicine, military, and technology, where lot of internet threats have also been raising, at least at the same rate, if not higher. The communication takes place in the form of text, image, voice, and video signals etc. And we deal with more image-based applications. There are many encryption techniques existing-DES, AES, RSA, etc. but they provide less security and are vulnerable to brute force attacks due to factors like small key space, to avoid which, chaos-based encryption was introduced. Chaotic systems are very sensitive to initial conditions and distort the image to beyond reversible state, except with a protection key with which it is encrypted, which is hard to find in such a large key space. In this paper we will discuss image encryption using combined chaos by combining various chaotic maps like logistics map, singer map, tent map, sine map, piecewise map etc. and attempt to compare the results for better combination for encryption.\",\"PeriodicalId\":272623,\"journal\":{\"name\":\"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA.2018.8474807\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA.2018.8474807","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Internet advances in the past decade have been upping at a tremendous pace; especially in the fields like medicine, military, and technology, where lot of internet threats have also been raising, at least at the same rate, if not higher. The communication takes place in the form of text, image, voice, and video signals etc. And we deal with more image-based applications. There are many encryption techniques existing-DES, AES, RSA, etc. but they provide less security and are vulnerable to brute force attacks due to factors like small key space, to avoid which, chaos-based encryption was introduced. Chaotic systems are very sensitive to initial conditions and distort the image to beyond reversible state, except with a protection key with which it is encrypted, which is hard to find in such a large key space. In this paper we will discuss image encryption using combined chaos by combining various chaotic maps like logistics map, singer map, tent map, sine map, piecewise map etc. and attempt to compare the results for better combination for encryption.