Abstract: This paper introduces a simple and effective improved one-dimension (1D) Logistic chaotic map. Simulations and performance evaluations show that the improved 1D Logistic chaotic map is able to get larger chaotic range and better chaotic behaviors compared with its prototype map. To investigate its applications in multimedia security, I propose an ef-ficient encryption algorithm for color image. Firstly, used an improved 1D Logistic chaotic map to confuse the addresses of a color image pixels. Secondly, decomposed the resultant image into 24-bits planes to get a bit-matrix containing a mixture of the red, green and blue elements. Finally, utilized global diffusion to permute the bit-matrix which makes the three elements influence e...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In the following paper, the novel method for color image encryption has proposed based on high level...
During the recent years several chaotic image encryption algorithms based on one dimensional (1-D) h...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
One of the most difficult issues in the history of communication technology is the transmission of s...
The paper presents an approach to encrypt the color images using bit-level permutation and alternate...
In this paper, an efficient chaos-based image encryption scheme for color images is proposed. This p...
Abstract- Using the chaotic theory in the color image encryption become a popular research field in ...
In this paper, an implementation of digital image encryption scheme based on one dimensional logisti...
With the popularity of the Internet, the transmission of images has become more frequent. It is of g...
Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to...
With the popularity of the Internet, the transmission of images has become more frequent. It is of g...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In the following paper, the novel method for color image encryption has proposed based on high level...
During the recent years several chaotic image encryption algorithms based on one dimensional (1-D) h...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
One of the most difficult issues in the history of communication technology is the transmission of s...
The paper presents an approach to encrypt the color images using bit-level permutation and alternate...
In this paper, an efficient chaos-based image encryption scheme for color images is proposed. This p...
Abstract- Using the chaotic theory in the color image encryption become a popular research field in ...
In this paper, an implementation of digital image encryption scheme based on one dimensional logisti...
With the popularity of the Internet, the transmission of images has become more frequent. It is of g...
Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to...
With the popularity of the Internet, the transmission of images has become more frequent. It is of g...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...