UCSY's Research Repository

Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping

Show simple item record

dc.contributor.author Htet, Lwin
dc.contributor.author Win, Su Thawda
dc.date.accessioned 2019-08-02T07:43:26Z
dc.date.available 2019-08-02T07:43:26Z
dc.date.issued 2009-08-03
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/1661
dc.description.abstract Nowadays, Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays important role. There are a lot of image encryption algorithms already presented. Because of storing large size of pixels, most of the functions are not appropriate for the image encryption. This system will present an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption based on chaos. Generally, it comprises of three main components: (1) horizontal vertical transformation function (HVT); (2) Shift function(S), and (3) grayscale function (GS) HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. GS function extends the algorithm to three-dimension, whereby, the third dimension refers to the level of the grayscale of a pixel. This secure image encryption will be applied to encrypt military images, such as Maps, Buildings, Arm forces, etc. en_US
dc.language.iso en en_US
dc.publisher Third Local Conference on Parallel and Soft Computing en_US
dc.title Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics