CFP last date
20 December 2024
Reseach Article

Image Encryption using Modified 4 out of 8 Code and Chaotic Map

by Sunil Kumar K. M, Kiran, Anand U. Hiremath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 11
Year of Publication: 2013
Authors: Sunil Kumar K. M, Kiran, Anand U. Hiremath
10.5120/12926-9755

Sunil Kumar K. M, Kiran, Anand U. Hiremath . Image Encryption using Modified 4 out of 8 Code and Chaotic Map. International Journal of Computer Applications. 74, 11 ( July 2013), 1-6. DOI=10.5120/12926-9755

@article{ 10.5120/12926-9755,
author = { Sunil Kumar K. M, Kiran, Anand U. Hiremath },
title = { Image Encryption using Modified 4 out of 8 Code and Chaotic Map },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 11 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number11/12926-9755/ },
doi = { 10.5120/12926-9755 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:41:56.946287+05:30
%A Sunil Kumar K. M
%A Kiran
%A Anand U. Hiremath
%T Image Encryption using Modified 4 out of 8 Code and Chaotic Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 11
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recently, several image encryption schemes based on chaotic maps have been proposed. Most of them hinder the system performance, security, and suffer from the small key space problem. This paper presents a image encryption using modified 4 out of 8 code and chaotic map. Generally image encryption involves permutation and substitution network. Here permutation is done by using chaotic map and using modified 4 out of 8 code carrier image is generated with the help of alpha-numeric keywords and also special characters. Substitution done by performing XOR operation between permuted image and carrier image to get a encrypted image. Simulations have been carried out and the results demonstrate the superior security and high efficiency of the proposed scheme.

References
  1. Zhi-liang Zhu , Wei Zhang, Kwok-wo Wong , Hai Yu ,A chaos-based symmetric image encryption scheme using a bit-level permutation,Information Sciences 181 (2011) 11711186.
  2. G. A. Sathish Kumar , K. Bhoopathy Bagan, V. Vivekanand, A Novel algorithm for image encryption by integrated pixel scrambling plus diffusion [IISPD] utilizing duo chaos mapping applicability in wireless systems,Procedia Computer Science 3 (2011) 378387.
  3. Prasanna SRM , An image encryption method with magnitude and phase manipulation using carrier images, IJCS 1(2):132137.
  4. A. Kumar, M. K. Ghose, Communications in Nonlinear Science and Numerical Simulation 16 (2011) 372.
  5. Ahmed A. Abd El-Latif , Xiamu Niu, A hybrid chaotic system and cyclic elliptic curve for image encryption Int. J. Electron. Commun. (AE) (2012). http://dx. doi. org/10. 1016/j. aeue. 2012. 07. 004.
  6. Panduranga H. T, Naveenkumar S. K,A novel image encryption method using 4outof8 code, proc. CommV09, pp 460 - 462, 2009.
  7. ZhiZhong, Double image encryption using double pixel scrambling and random phase encoding,Optics Communications 285 (2012) 584588.
  8. Narendra K Pareek,Design and analysis of a novel digital image encryption scheme, IJNSA, Vol. 4, No. 2, March 2012, pp. 95-108.
  9. YueWu, Joseph P. Noonan, Shannon Entropy based Randomness Measurement and Test for Image Encryption Information Sciences 00 (2011) 123
  10. Yue Wu, Joseph P. Noonan, and Sos Agaian, NPCR and UACI Randomness Tests for Image Encryption Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

4 out of 8 code Carrier image Chaotic map