Image Cryptography Technique based on FFT
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Image Cryptography Technique based on FFT

Mudiyala. Akila Sowndarya, Damodara V V S Phani Kumar

The author of this article makes studies and discussion on the image cryptography of transforming domains. In the image cryptographic algorithm, the sine chaotic mapping scrambling is applied to the original image and the scrambling matrix is generated by Logistic chaotic system. Fractional Fourier transform (FFT), respectively, is along the x-axis and y-axis that generates a function which is transformed random in the phase mask. The function of the phase mask uses the Logistic chaotic system. The simulation experiments verifies that this algorithm can effectively resist plaintext attack, differential attack and statistical analysis, and the large key space can be achieved to 1087, and has a higher security.

Keywords: Fractional Fourier transform, scrambling, image encryption

Edition: Volume 3 Issue 11, November 2014

Pages: 2114 - 2117

Share this Article

How to Cite this Article?

Mudiyala. Akila Sowndarya, Damodara V V S Phani Kumar, "Image Cryptography Technique based on FFT", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=7111401, Volume 3 Issue 11, November 2014, 2114 - 2117

48 PDF Views | 50 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'scrambling'

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this Article

Research Paper, Computer Science & Engineering, Nigeria, Volume 5 Issue 7, July 2016

Pages: 2104 - 2106

A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security

OYINLOYE Oghenerukevwe Elohor, Benson Ojedayo

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1597 - 1601

Lossless and Reversible Combine Data Hiding using 4LSB in Encrypted Images with Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1678 - 1682

A Survey on an Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds

Namrata Charati, M. D. Ingle

Share this Article

Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 2178 - 2182

An Overview of Crypto-Compressive Based on Selective Coding

Enas Kh Alamiry, Faisal G. Mohammed

Share this Article

Similar Articles with Keyword 'image encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2480 - 2483

PSO (Particle Swarm Optimization) Based Reversible Data Hiding

Kritika Jaidka, Amandeep Mavi

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1551 - 1554

Implementation of Encryption and Decryption Technique

Dayanand G Savakar, Anand S Ghuli

Share this Article

Research Paper, Computer Science & Engineering, Indonesia, Volume 5 Issue 10, October 2016

Pages: 1363 - 1365

Arnold?s Cat Map Algorithm in Digital Image Encryption

Eko Hariyanto; Robbi Rahim

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1939 - 1942

An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio

Minal C. Toley, Mayur S.Burange

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

Share this Article
Top