International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Iraq | Volume 8 Issue 8, August 2019

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

With increase exchange of sensitive multimedia data like text, video, voice, image over unsecure networks and to meet the real time constraints, secure and efficient image encryption scheme becomes more and more urgent need to provide the desirable confidentiality and thwart attacks, in this paper a secure image encryption method is proposed, based on fast generation of large keys from two hyperchaotic systems to permuted and mask the plain image with the purpose of get the advantages of these systems, at the permutation step the chaotic numbers generated from systems utilized to shuffling rows and columns of image, will in diffusion step the image is split to 2 sup-images and each part XOR with chaotic mask generated from distinct hyperchaotic system, he main features of such method are high speed, large key space and low computational overhead, as well the experimental results demonstrate that the proposed method have more ability to thwart different attacks such as statistical, differential, entropy attack, and brute-force attack.

Keywords: Hyperchaoc, Initial conditions, Histogram, Correlation

Edition: Volume 8 Issue 8, August 2019

Pages: 522 - 525


How to Cite this Article?

Hayder Abbood Qasim, "Secure Image Encryption Method Using Hyperchaotic Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2020170, Volume 8 Issue 8, August 2019, 522 - 525

93 PDF Views | 51 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Initial conditions'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1000 - 1004

Survey of 3D Chaotic Map Techniques for Image Encryption

Lokesh P. Gagnani, Dr. Sunita Varjani

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 8 Issue 8, August 2019

Pages: 522 - 525

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

Share this article

Similar Articles with Keyword 'Histogram'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1731 - 1734

A Survey on Multimodal Visual Search Methods

Seema Ranuji Ghule

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2321 - 2323

Integrated Data Hiding and Lossless Image Compression based on SMVQ and Image Inpainting

Sandeep Kumar, Nidhi Garg

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2015 - 2020

Automatic ECG Anomalous Identification Using XML Data Processing

K. Mathivanan, K. Vijay

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2472 - 2475

Mining Interaction Patterns among Brain Regions by Clustering Based Interactive K-Means

Amruta S. Chougule, S. A. Bajpai

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 433 - 436

Nitrogen Management for Maize using Image Processing

K.Vasantha Kumar, V. Valli Kumari

Share this article

Similar Articles with Keyword 'Correlation'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1121 - 1125

An Efficient Framework for Spam Mail Detection in Attachments using NLP

Amol Malge, Dr. S. M. Chaware

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1925 - 1927

Survey on Secured Association Rule Mining in Partitioned Database

Gurpreet Kaur Bhatti, Prof. Ravi Patki

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2790 - 2794

Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis

Sucheta Gulia, Dr. Rajan Vohra

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this article

Top