Secure Image Encryption Method Using Hyperchaotic Systems
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Iraq | Volume 8 Issue 8, August 2019

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

With increase exchange of sensitive multimedia data like text, video, voice, image over unsecure networks and to meet the real time constraints, secure and efficient image encryption scheme becomes more and more urgent need to provide the desirable confidentiality and thwart attacks, in this paper a secure image encryption method is proposed, based on fast generation of large keys from two hyperchaotic systems to permuted and mask the plain image with the purpose of get the advantages of these systems, at the permutation step the chaotic numbers generated from systems utilized to shuffling rows and columns of image, will in diffusion step the image is split to 2 sup-images and each part XOR with chaotic mask generated from distinct hyperchaotic system, he main features of such method are high speed, large key space and low computational overhead, as well the experimental results demonstrate that the proposed method have more ability to thwart different attacks such as statistical, differential, entropy attack, and brute-force attack.

Keywords: Hyperchaoc, Initial conditions, Histogram, Correlation

Edition: Volume 8 Issue 8, August 2019

Pages: 522 - 525

Share this Article

How to Cite this Article?

Hayder Abbood Qasim, "Secure Image Encryption Method Using Hyperchaotic Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2020170, Volume 8 Issue 8, August 2019, 522 - 525

189 PDF Views | 135 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Initial conditions'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1000 - 1004

Survey of 3D Chaotic Map Techniques for Image Encryption

Lokesh P. Gagnani, Dr. Sunita Varjani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 77 - 81

Modified Algorithm of Encryption and Decryption of Images using Chaotic Mapping

A.Anto Steffi, Dipesh Sharma

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 8 Issue 8, August 2019

Pages: 522 - 525

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

Share this Article

Similar Articles with Keyword 'Histogram'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1891 - 1895

Image Normalization Robust using Histogram Equalization and Logarithm Transform Frequency DCT Coefficients for Illumination in Facial Images

Dr. V. S. Manjula

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1019 - 1020

Survey on Cancer Detection using Content Based Image Retrieval Technique

Aparna W. Bondade, Priti Saktel

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1647 - 1650

MRI Brain Tumor Classification Using SVM and Histogram Based Image Segmentation

Chinnu A

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1731 - 1734

A Survey on Multimodal Visual Search Methods

Seema Ranuji Ghule

Share this Article

Similar Articles with Keyword 'Correlation'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2297 - 2299

Measuring and Comparing Semantic Structure of Ontology

Nirmitee N. Kurhekar, Prof. L. J. Sankpal

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2790 - 2794

Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis

Sucheta Gulia, Dr. Rajan Vohra

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 872 - 877

Ranking and Clustering of Software Cost Estimation Models

Vijaya Wable, S. M. Shinde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1212 - 1215

A Novel Hybrid Face Recognition Algorithm Based On Neural Network with Fuzzy Sets

Raunil Singh, Kiran Gupta

Share this Article
Top