ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Multiple 3D Chaotic Keys to Protect Digital Images

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.12, No. 4)

Publication Date:

Authors : ; ;

Page : 1-16

Keywords : Cryptography; quality; sensitivity; performance; CLK; CLMM; MSE; PSNR; NPCR;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A simple, multipurpose, efficient, sensitive and highly qualities method of image cryptography will be introduced in this research paper. The method will be easily used to encrypt-decrypt any type of image with any size (gray and color images). The proposed method will secure the image by providing a high degree of image protection based on using a complex private key, which contains eight values, each of the has a double data type. The private key will provide the required key space to resist any hacking attack. The private key components will be used to calculate the size of the generated 3D chaotic logistic key. The private key will also be used to run two chaotic logistic map models to get two different chaotic keys base on the chaotic parameters values included in the private key. Two rounds of XORing operations will be used to generate the encrypted-decrypted image. The generated outputs of the proposed method will be sensitive to the selected value of the private key. The proposed method will be very flexible, changing the source image or/and changing the private key will not require any changes in the method algorithm. The proposed method will be tested and implemented using various image, the obtained results will be discussed to prove the features provided by the method: quality, sensitivity, security and efficiency.

Last modified: 2023-04-07 19:08:26