Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Using self-adaptive coupled piecewise nonlinear chaotic map for color image encryption scheme

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Seyedzadeh, S.M. ; Iran University of Science and Technology, Tehran, Iran ; Moosavi, S.M.S. ; Mirzakuchaki, S.

In recent years, various image encryption algorithms based on chaos-based image cryptosystems have been proposed. In this paper, a design of the compound one-dimensional chaotic function by coupling piecewise nonlinear chaotic map and nearest-neighboring coupled-map lattices (NCML) suggests self-adaptive color image encryption. The coupling and nonlinear structure of the compound chaotic function enhances cryptosystem security. The self-adaptive color image encryption is carried out by using one half of the image data for encryption of the other half of the image recursively. The salient features of the proposed image encryption scheme are high security level, high sensitivity, high speed and large key space. In order to generate the initial conditions and parameters of the chaotic function of one half of the image, 192-bit-long external secret key and the other half of the image data are used. The results of several experimental, statistical analysis and key sensitivity tests for color images have shown the high performance on the sensitivity, speed and security of the proposed algorithm.

Published in:

Electrical Engineering (ICEE), 2011 19th Iranian Conference on

Date of Conference:

17-19 May 2011