Javascript must be enabled to continue!
A New Image Encryption Technique Based on Sine Map, Chaotic Tent Map, and Circulant Matrices
View through CrossRef
Image encryption is one of the sensitive areas used recently to save information over the Internet and confirms the security on a higher level. A new cryptosystem has been proposed for the encoding and decoding of images using sine map, chaotic tent map, and circulant matrices. The process involves three stages. The sine map is used for the permutation phase. In the substitution phase, the Hill cipher method together with prime circulant matrix are used and a chaotic tent map is used in the diffusion phase. The algorithm becomes impenetrable to resist differential- and statistical-type attacks. The algorithm's key space is sufficient in size to withstand brute-force attacks. This symmetric image encryption algorithm indicates good results for correlation analysis, key space analysis, entropy analysis, key sensitivity analysis, histogram analysis, number of pixel change rate (NPCR), unified average changing intensity (UACI), and peak signal-to-noise ratio (PSNR). From all these simulation results, we come to know that the constructed image encryption cryptosystem is systematic and vigorous, supplying better protection for image encryption.
Title: A New Image Encryption Technique Based on Sine Map, Chaotic Tent Map, and Circulant Matrices
Description:
Image encryption is one of the sensitive areas used recently to save information over the Internet and confirms the security on a higher level.
A new cryptosystem has been proposed for the encoding and decoding of images using sine map, chaotic tent map, and circulant matrices.
The process involves three stages.
The sine map is used for the permutation phase.
In the substitution phase, the Hill cipher method together with prime circulant matrix are used and a chaotic tent map is used in the diffusion phase.
The algorithm becomes impenetrable to resist differential- and statistical-type attacks.
The algorithm's key space is sufficient in size to withstand brute-force attacks.
This symmetric image encryption algorithm indicates good results for correlation analysis, key space analysis, entropy analysis, key sensitivity analysis, histogram analysis, number of pixel change rate (NPCR), unified average changing intensity (UACI), and peak signal-to-noise ratio (PSNR).
From all these simulation results, we come to know that the constructed image encryption cryptosystem is systematic and vigorous, supplying better protection for image encryption.
Related Results
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Determinants of some special matrices over commutative finite chain rings
Determinants of some special matrices over commutative finite chain rings
AbstractCirculant matrices over finite fields and over commutative finite chain rings have been of interest due to their nice algebraic structures and wide applications. In many ca...
Research on Image Encryption Method based on the Chaotic Iteration of a
Ternary Nonlinear Function
Research on Image Encryption Method based on the Chaotic Iteration of a
Ternary Nonlinear Function
Objective:
Considering that some image encryption algorithms have the disadvantages
of complex structure and high computational cost, and there are not many commonly used chaotic
s...
Layered Image Encryption Method Based on Combination of Logistic Map, Henon Map, and Sine Map to Enhance Digital Image Security
Layered Image Encryption Method Based on Combination of Logistic Map, Henon Map, and Sine Map to Enhance Digital Image Security
In today's digital era, ensuring the confidentiality of image data is crucial due to the widespread use of images in fields such as medical imaging, military communication, and mul...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract
This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
Recognizing Circulant Graphs of Prime Order in Polynomial Time
Recognizing Circulant Graphs of Prime Order in Polynomial Time
A circulant graph $G$ of order $n$ is a Cayley graph over the cyclic group ${\bf Z}_n.$ Equivalently, $G$ is circulant iff its vertices can be ordered such that the corresponding a...

