원문정보
보안공학연구지원센터(IJFGCN)
International Journal of Future Generation Communication and Networking
vol.2 no.3
2009.09
pp.23-36
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Chaotic systems are extremely sensitive to control parameters and initial conditions. This feature is effective in the field of cryptography. In this paper we propose image encryption scheme which is based on the chaotic maps of Peter de Jong’s attractor. The image is transferred into the wavelet domain and then appropriate modifications of the wavelet coefficients are done. The main purpose of application of the wavelet transformation is to reduce computation time needed for the encryption process and to reach higher or similar security of the encrypted image.
목차
Abstract
1. Introduction
2. Methods
2.1. Chaos and strange attractors
2.2. Image representation in the wavelet domain
2.3. Image encryption scheme
3. Experimental results and security analyses
4. Performance evaluation
5. Conclusion
References
1. Introduction
2. Methods
2.1. Chaos and strange attractors
2.2. Image representation in the wavelet domain
2.3. Image encryption scheme
3. Experimental results and security analyses
4. Performance evaluation
5. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보