UCSY's Research Repository

Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study

Show simple item record

dc.contributor.author Hlaing, Wut Yee Pwint
dc.contributor.author Aye, Zin May
dc.date.accessioned 2019-07-03T08:08:04Z
dc.date.available 2019-07-03T08:08:04Z
dc.date.issued 2016-02-25
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/321
dc.description.abstract Nowadays, image information is routinely used in many applications. This paper presents comparative study for image encryption based on Chaotic Logistic Map with external secret key of both 80 bit and 256 bit with different logistic maps. Security is critical issue when images are sent from journalist to editor via communication channel. To apply image security on this media system, journalist encrypts and sends cipher image to editor and only authorized editor can decrypt cipher image. Chaotic Logistic Map with 80 bit is implemented in web based system because of its randomness, less correlation and unpredictable behavior in long term that are secure and safe. Chaotic Logistic encryption scheme provides good combination of highly secured, fast processing, efficient and secure way for image encryption. Correlation coefficient, NPCR (change rate of the number of pixels of ciphered image) and histogram are analyzed to prove security of algorithm used in this system. en_US
dc.language.iso en en_US
dc.publisher Fourteenth International Conference On Computer Applications (ICCA 2016) en_US
dc.title Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics