By Topic

Hybrid image encryption using multi-chaos-system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

7 Author(s)
Nien, H.H. ; Dept. of Electr. Eng., Chienkuo Technol. Univ., Changhua, Taiwan ; Huang, W.T. ; Hung, C.M. ; Chen, S.C.
more authors

As a result of the development of computer network technology, communication of information through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. Therefore the communication security is now an important issue for multimedia communications. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines Pixel-Chaotic-Shuffle (PCS) and Bit-Chaotic-Rearrangement (BCR). The idea of applying chaos theory on image encryption is because of the behavior of chaos system exhibiting nonlinear dynamics and sensitivity to initial conditions. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. In this paper, the pixels of plain image are firstly disarrayed by PCS, and then their bits are rearranged using BCR. This method increases the key space of images, completely eradicates the outlines of the encrypted images, blurs the distribution characteristics of RGB-level matrices, and effectively protects against the decryption of exhaustive attack method. The test methods involving key space and correlation coefficient r are adopted for the security analysis. Eventually, empirical images are adopted as examples to prove the great encryption performance of the proposed method and also the good potential for practical applications in image encryption.

Published in:

Information, Communications and Signal Processing, 2009. ICICS 2009. 7th International Conference on

Date of Conference:

8-10 Dec. 2009