8
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      2D Hybrid chaos map for image security transform based on framelet and cellular automata

      Preprint

      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In this paper, we provide some safe ways to transfer images securely by using cryptography and steganography methods. In order to enhance the security of the image transmission, we introduce a new type of uniformly distributed 2D-hybrid chaos map based on Logistic, Sine and Tent maps, and use the cellular automata and discrete framelet transform in the proposed algorithms and also mix the position of the image pixels by apply kinds of shifts. To show that the proposed algorithms are able to resist various attacks, different types of simulation results and security analysis are used.

          Related collections

          Most cited references 33

          • Record: found
          • Abstract: not found
          • Article: not found

          SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Symmetric Ciphers Based on Two-Dimensional Chaotic Maps

             Jiri Fridrich (1998)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Measurement of the Lyapunov spectrum from a chaotic time series.

                Bookmark

                Author and article information

                Journal
                10 October 2018
                Article
                1810.06333

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                Custom metadata
                cs.CR

                Security & Cryptology

                Comments

                Comment on this article