Analysis of statistical properties of chaos based image encryption by different mappings

Chaos mappings attracted a lot of research in recent years because of good properties of chaos maps in terms of continuous broad band power spectrums, sensitivity to initial conditions and similarity to random behavior. Many different scheme and algorithms have proposed in image encryption by chaos...

Full description

Saved in:
Bibliographic Details
Main Authors: Roohi, Leyla, Ibrahim, Subariah, Moieni, Rezza
Format: Article
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/40294/
http://research.ijcaonline.org/volume62/number20/pxc3885054.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.40294
record_format eprints
spelling my.utm.402942019-01-28T03:54:19Z http://eprints.utm.my/id/eprint/40294/ Analysis of statistical properties of chaos based image encryption by different mappings Roohi, Leyla Ibrahim, Subariah Moieni, Rezza QA75 Electronic computers. Computer science Chaos mappings attracted a lot of research in recent years because of good properties of chaos maps in terms of continuous broad band power spectrums, sensitivity to initial conditions and similarity to random behavior. Many different scheme and algorithms have proposed in image encryption by chaos maps as well as different mappings. Not only can the structure of algorithm effect on statistical properties of image encryption, but also different chaos maps can, because of different dynamical properties. PWLCM has attracted a lot of research on recent years regarding good dynamical properties. In following sections, the statistical properties of Yoon algorithm [7] will analysis with PWLCM to conclude better statistical properties and better key space. 2013 Article PeerReviewed Roohi, Leyla and Ibrahim, Subariah and Moieni, Rezza (2013) Analysis of statistical properties of chaos based image encryption by different mappings. International Journal of Computer Applications, 62 (20). pp. 38-42. ISSN 0975-8887 http://research.ijcaonline.org/volume62/number20/pxc3885054.pdf
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Roohi, Leyla
Ibrahim, Subariah
Moieni, Rezza
Analysis of statistical properties of chaos based image encryption by different mappings
description Chaos mappings attracted a lot of research in recent years because of good properties of chaos maps in terms of continuous broad band power spectrums, sensitivity to initial conditions and similarity to random behavior. Many different scheme and algorithms have proposed in image encryption by chaos maps as well as different mappings. Not only can the structure of algorithm effect on statistical properties of image encryption, but also different chaos maps can, because of different dynamical properties. PWLCM has attracted a lot of research on recent years regarding good dynamical properties. In following sections, the statistical properties of Yoon algorithm [7] will analysis with PWLCM to conclude better statistical properties and better key space.
format Article
author Roohi, Leyla
Ibrahim, Subariah
Moieni, Rezza
author_facet Roohi, Leyla
Ibrahim, Subariah
Moieni, Rezza
author_sort Roohi, Leyla
title Analysis of statistical properties of chaos based image encryption by different mappings
title_short Analysis of statistical properties of chaos based image encryption by different mappings
title_full Analysis of statistical properties of chaos based image encryption by different mappings
title_fullStr Analysis of statistical properties of chaos based image encryption by different mappings
title_full_unstemmed Analysis of statistical properties of chaos based image encryption by different mappings
title_sort analysis of statistical properties of chaos based image encryption by different mappings
publishDate 2013
url http://eprints.utm.my/id/eprint/40294/
http://research.ijcaonline.org/volume62/number20/pxc3885054.pdf
_version_ 1643650437620957184
score 13.2014675