Javascript must be enabled to continue!
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
View through CrossRef
A novel image encryption scheme comprising of one permutation process and one diffusion process is proposed. In the permutation process, the image sized is expanded to one sized by dividing the plain-image into two parts: one consisting of the higher 4bits and one consisting of the lower 4bits. The permutation operations are done row-by-row and column-by-column to increase the speed. The chaotic generalized Arnold map is utilized to generate chaotic sequence, which is quantized to shuffle the expanded image. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plain-image sensitivity. To achieve more avalanche effect and larger key space, Chinese Remainder Theorem is applied to diffuse the shuffled image. The key sensitivity and key space of the proposed image encryption have been analyzed as well. The experimental results suggest that the proposed image encryption scheme can be used for secure image and video communication applications.
Trans Tech Publications, Ltd.
Title: An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
Description:
A novel image encryption scheme comprising of one permutation process and one diffusion process is proposed.
In the permutation process, the image sized is expanded to one sized by dividing the plain-image into two parts: one consisting of the higher 4bits and one consisting of the lower 4bits.
The permutation operations are done row-by-row and column-by-column to increase the speed.
The chaotic generalized Arnold map is utilized to generate chaotic sequence, which is quantized to shuffle the expanded image.
The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plain-image sensitivity.
To achieve more avalanche effect and larger key space, Chinese Remainder Theorem is applied to diffuse the shuffled image.
The key sensitivity and key space of the proposed image encryption have been analyzed as well.
The experimental results suggest that the proposed image encryption scheme can be used for secure image and video communication applications.
Related Results
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract
This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Abstract
With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced ...
Double Exposure
Double Exposure
I. Happy Endings
Chaplin’s Modern Times features one of the most subtly strange endings in Hollywood history. It concludes with the Tramp (Chaplin) and the Gamin (Paulette Godda...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...

