One small step for a man
One Giant leap for the mankind

There is no wealth like Knowledge
                            No Poverty like Ignorance
Journal of Emerging Trends in Computing and Information Sciences Logo

Journal of Emerging Trends in Computing and Information Sciences >> Call for Papers Vol. 8 No. 3, March 2017

Journal of Emerging Trends in Computing and Information Sciences

A Highly Secure Image Encryption Scheme using Compound Chaotic Maps

Full Text Pdf Pdf
Author Ruisong Ye
ISSN 2079-8407
On Pages 532-544
Volume No. 4
Issue No. 6
Issue Date July 01, 2013
Publishing Date July 01, 2013
Keywords chaotic system , skew tent map , Arnold map , image encryption scheme


During the last two decades various chaotic image encryption algorithms have been proposed, but most of them encountered some defects like small key space, low speed, lack of robustness and weak security. This paper proposes a chaos - based image encryption scheme with a permutation – diffusion me chanism, where six skew tent maps and one six - dimensional Arnold map are utilized to generate one hybrid chaotic orbit applied to disorder the pixel positions in the permutation process , while four skew tent maps and one Arnold map are employed to yield tw o random gray value sequences to change the gray values by a two - way diffusion process. The major merits of the proposed image encryption scheme include a huge key space, desirable computation overhead, good statistical nature resisting statistical attack, differential attack and satisfying robustness against malicious attacks on cipher - images, such as cropping, noising, JPEG compression. Experimental results have been carried out with detailed analysis to show that the proposed scheme can be a potential ca ndidate for practical image encryption.

    Journal of Computing | Call for Papers (CFP) | Journal Blog | Journal of Systems and Software | ARPN Journal of Science and Technology | International Journal of Health and Medical Sciences | International Journal of Economics, Finance and Management     
© 2015 Journal of Computing