International audienceSince two decades, and in order to reach higher performance, more and more studies look to combine the conventional encryption methods and the complex behaviour of chaotic signals. To quantify the expected improvement induced by such a mix, this paper aims to compare the performance of two well known chaotic maps, namely, Logistic and piecewise linear chaotic map with their performance when they are perturbed by a new technique. These four chaotic maps are then used to control three bit permutation methods: Grp, Cross and Socek, known to have good inherent cryptographic properties. When applied to images, the common measures like NPCR, UACI, intra and inter-components correlation coefficients, histogram and distributio...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Image scrambling is a process to convert a meaningful image into an unidentifiable or an unordered i...
Image scrambling is a process to convert a meaningful image into an unidentifiable or an unordered i...
International audienceSince two decades, and in order to reach higher performance, more and more stu...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
The exchange of information over open networks and the internet has grown rapidly. Digital images oc...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Secure image transmission is one of the most challenging problems in the age of communication techno...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...
In the following paper, the novel method for color image encryption has proposed based on high level...
Secure image transmission is one of the most challenging problems in the age of communication techno...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Image scrambling is a process to convert a meaningful image into an unidentifiable or an unordered i...
Image scrambling is a process to convert a meaningful image into an unidentifiable or an unordered i...
International audienceSince two decades, and in order to reach higher performance, more and more stu...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
The exchange of information over open networks and the internet has grown rapidly. Digital images oc...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Secure image transmission is one of the most challenging problems in the age of communication techno...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...
In the following paper, the novel method for color image encryption has proposed based on high level...
Secure image transmission is one of the most challenging problems in the age of communication techno...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Image scrambling is a process to convert a meaningful image into an unidentifiable or an unordered i...
Image scrambling is a process to convert a meaningful image into an unidentifiable or an unordered i...