High security image encryption by two-stage process

C. K. Huang, Y. H. Hsu, W. Y. Chen, S. K. Changchien, C. M. Hung, C. H. Liu, Y. R. Tian

研究成果: Conference contribution

1 引文 斯高帕斯(Scopus)

摘要

The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines Pixel-Chaotic-Shuffle (PCS) and Image-Multi-Encryption (IME). This method completely eradicates the outlines of the encrypted images, blurs the distribution characteristics of RGB-level matrices, effectively protects against the decryption of exhaustive attack method, and more over, increases the key space of encrypted images. The test methods involving key space and correlation coefficient r are adopted for the security analysis. Also NPCR (Number of Pixel Change Rate) and UACI (Unified Average Changing Intensity) are proceeded for the proof of the distinguished characteristic of pixels in the encrypted image. Eventually, empirical images are conducted as illustrations, which show that the proposed method has the great encryption performance and achieves the high confidential security.

原文English
主出版物標題ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing
DOIs
出版狀態Published - 2009 十二月 1
事件7th International Conference on Information, Communications and Signal Processing, ICICS 2009 - Macau Fisherman's Wharf, Macao
持續時間: 2009 十二月 82009 十二月 10

出版系列

名字ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing

Other

Other7th International Conference on Information, Communications and Signal Processing, ICICS 2009
國家Macao
城市Macau Fisherman's Wharf
期間09-12-0809-12-10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Signal Processing

指紋 深入研究「High security image encryption by two-stage process」主題。共同形成了獨特的指紋。

  • 引用此

    Huang, C. K., Hsu, Y. H., Chen, W. Y., Changchien, S. K., Hung, C. M., Liu, C. H., & Tian, Y. R. (2009). High security image encryption by two-stage process. 於 ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing [5397629] (ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing). https://doi.org/10.1109/ICICS.2009.5397629