首页> 外文会议>2015 International Conference on Industrial Instrumentation and Control >A secured Transmission of data using 3D chaotic map encryption and data hiding technique
【24h】

A secured Transmission of data using 3D chaotic map encryption and data hiding technique

机译:使用3D混沌地图加密和数据隐藏技术的安全数据传输

获取原文
获取原文并翻译 | 示例

摘要

Transmission of important data like text, images, video, etc over the internet is increases now days hence it's necessary to use of secure methods for multimedia data. Image encryption is most secure than other multimedia components encryption because some inherent properties such as higher data capacity and high similarity between pixels. The older encryption techniques such as AES, DES, RTS are not suitable for highly secure data transmission on wireless media. Thus we combine the chaotic theory and cryptography to form an valuable technique for information security. In the first stage, a user encrypts the original input image using chaotic map theory. After that data-hider compresses the LSB bits of the encrypted image using a data-hiding key to make space for accommodate some more data. In now day's image encryption is chaos based for some unique characteristics such as correlation between neighboring pixels, sensitivity to initial conditions, non-periodicity, and control parameters. There are number of image encryption algorithms based on chaotic maps have been implemented some of them are time consuming, complex and some have very little key space. In this paper we implement three non linier differential chaos based encryption technique where for the first time 3 differential chaoses is used for position permutation and value transformation technique. In the data hiding phase, data which is in the binary forms embedded into encrypted image by using least significant bit algorithm. We tabulate correlation coefficient value both horizontal and vertical position for cipher and original image and compare performance of our Method with some existing methods. We also discuss about different types of attack, key sensitivity, and key space of our proposed approach. The given approach is very simple, fast, accurate and it have been applied together as a double algorithm in order to serve best results in highly unsecure and complex environment. Each of these algorith- s are been discussed one by one below.
机译:如今,通过互联网传输重要数据(例如文本,图像,视频等)的数量正在增加,因此有必要使用安全的方法来处理多媒体数据。图像加密比其他多媒体组件加密最安全,因为它具有一些固有的特性,例如更高的数据容量和像素之间的高度相似性。诸如AES,DES,RTS之类的较旧的加密技术不适合在无线媒体上进行高度安全的数据传输。因此,我们将混沌理论与密码学结合起来,形成了一种有价值的信息安全技术。在第一阶段,用户使用混沌映射理论对原始输入图像进行加密。之后,数据隐藏者使用数据隐藏密钥压缩加密图像的LSB位,以腾出空间容纳更多数据。如今,基于某些独特特征(例如,相邻像素之间的相关性,对初始条件的敏感度,非周期性和控制参数)的图像加密是混乱的。已经实现了许多基于混沌映射的图像加密算法,其中一些算法耗时,复杂,而另一些密钥空间很少。在本文中,我们实现了三种基于非线性微分混沌的加密技术,其中首次将3个微分混沌用于位置置换和值转换技术。在数据隐藏阶段,通过使用最低有效位算法将二进制形式的数据嵌入到加密图像中。我们将密码和原始图像的水平和垂直位置的相关系数值制成表格,并将本方法的性能与现有方法进行比较。我们还将讨论所提议方法的不同类型的攻击,密钥敏感性和密钥空间。给定的方法非常简单,快速,准确,并且已作为一种双重算法一起应用,以便在高度不安全和复杂的环境中提供最佳结果。下面将逐一讨论这些算法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号