Secure Encrypted Data Transmission Via Multiple Chaotic Maps
2019 International Conference on Computer Communication and Informatics (ICCCI)(2019)
摘要
Encryption is carried out for private sharing of confidential data. It is used to avoid data breach. The process involves randomising the image pixels using three chaotic sequences namely masking, swapping and permutation sequence. XOR is done between the image pixels and the masking sequence. The masked sequence is then shuffled using the permutation sequence. This is then diffused using the swapping sequence. This encrypted data is more randomised using four different permutation sequence namely discrete chaos, continuous chaos, dynamic random growth and coupled map lattice. The image is divided into four parts, and each part is encrypted using XOR based on the chess-based horse move algorithm. The strength of the image encryption process is calculated using the different encryption metrics.
更多查看译文
关键词
masking,swapping,discrete chaos,continuous chaos,dynamic random growth,coupled map lattice.
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络