International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 172

Research Paper | Computer Science & Engineering | Iraq | Volume 8 Issue 8, August 2019


Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim


Abstract: With increase exchange of sensitive multimedia data like text, video, voice, image over unsecure networks and to meet the real time constraints, secure and efficient image encryption scheme becomes more and more urgent need to provide the desirable confidentiality and thwart attacks, in this paper a secure image encryption method is proposed, based on fast generation of large keys from two hyperchaotic systems to permuted and mask the plain image with the purpose of get the advantages of these systems, at the permutation step the chaotic numbers generated from systems utilized to shuffling rows and columns of image, will in diffusion step the image is split to 2 sup-images and each part XOR with chaotic mask generated from distinct hyperchaotic system, he main features of such method are high speed, large key space and low computational overhead, as well the experimental results demonstrate that the proposed method have more ability to thwart different attacks such as statistical, differential, entropy attack, and brute-force attack.


Keywords: Hyperchaoc, Initial conditions, Histogram, Correlation


Edition: Volume 8 Issue 8, August 2019,


Pages: 522 - 525


How to Cite this Article?

Hayder Abbood Qasim, "Secure Image Encryption Method Using Hyperchaotic Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART2020170, Volume 8 Issue 8, August 2019, 522 - 525

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Initial conditions'

Downloads: 124

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1000 - 1004

Survey of 3D Chaotic Map Techniques for Image Encryption

Lokesh P. Gagnani, Dr. Sunita Varjani

Share this Article

Downloads: 131

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 77 - 81

Modified Algorithm of Encryption and Decryption of Images using Chaotic Mapping

A.Anto Steffi, Dipesh Sharma

Share this Article

Similar Articles with Keyword 'Histogram'

Downloads: 34

Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021

Pages: 524 - 528

Detection and Classification of Skin Cancer using Image Processing Techniques

Maha Shawish, Balsam Eid

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1019 - 1020

Survey on Cancer Detection using Content Based Image Retrieval Technique

Aparna W. Bondade, Priti Saktel

Share this Article

Similar Articles with Keyword 'Correlation'

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2297 - 2299

Measuring and Comparing Semantic Structure of Ontology

Nirmitee N. Kurhekar, Prof. L. J. Sankpal

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article
Top