Secure Image Encryption Method Using Hyperchaotic Systems
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | Iraq | Volume 8 Issue 8, August 2019

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

With increase exchange of sensitive multimedia data like text, video, voice, image over unsecure networks and to meet the real time constraints, secure and efficient image encryption scheme becomes more and more urgent need to provide the desirable confidentiality and thwart attacks, in this paper a secure image encryption method is proposed, based on fast generation of large keys from two hyperchaotic systems to permuted and mask the plain image with the purpose of get the advantages of these systems, at the permutation step the chaotic numbers generated from systems utilized to shuffling rows and columns of image, will in diffusion step the image is split to 2 sup-images and each part XOR with chaotic mask generated from distinct hyperchaotic system, he main features of such method are high speed, large key space and low computational overhead, as well the experimental results demonstrate that the proposed method have more ability to thwart different attacks such as statistical, differential, entropy attack, and brute-force attack.

Keywords: Hyperchaoc, Initial conditions, Histogram, Correlation

Edition: Volume 8 Issue 8, August 2019

Pages: 522 - 525

Share this Article

How to Cite this Article?

Hayder Abbood Qasim, "Secure Image Encryption Method Using Hyperchaotic Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2020170, Volume 8 Issue 8, August 2019, 522 - 525

120 PDF Views | 82 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Initial conditions'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1000 - 1004

Survey of 3D Chaotic Map Techniques for Image Encryption

Lokesh P. Gagnani, Dr. Sunita Varjani

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 8 Issue 8, August 2019

Pages: 522 - 525

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

Share this Article

Similar Articles with Keyword 'Histogram'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1915 - 1919

Optimized Content Based Image Retrieval System using Colored Features with IWD

Damandeep Singh, Nitin Bhagat

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 584 - 586

A Review on Histogram Shifting for Reversible Watermarking Technique

Naina Gaharwar, Dr. Reena Gunjan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2334 - 2338

A Novel Technique to Improve Impulse Noise from Digital Images

Rahul Bhan, Ashish Verma, Kushagra Sharma

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1731 - 1734

A Survey on Multimodal Visual Search Methods

Seema Ranuji Ghule

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 762 - 767

Reversible Data Hiding in Encrypted Images

Chaple Gopal, G Balram

Share this Article

Similar Articles with Keyword 'Correlation'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 621 - 623

A Survey: By Using Frequent Pattern Growth Infrequent Weighted Itemset Mining

Vaidya Seema Bhagwan, A. B. Bagwan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2015 - 2017

Frequent Pattern Growth to Mine Infrequent Weighted Item-Set

Vaidya Seema Bhagwan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article
Top