Abstract

A new hybrid chaotic map is constructed in this paper and applied to image encryption and hiding. MD5 is used as part of initial condition and control parameter to perturb the trajectory in order to further increase the security against plaintext-chosen attacks and differential attacks. Ciphered image is embedded into several carrier images to reduce suspiciousness and to increase robustness. The results demonstrate that the proposed scheme is of great security, robustness, and efficiency.

Highlights

  • Owing to the rapid development of the Internet, a lot of confidential information transfers across the world over public networks in all fields of the society

  • The results demonstrate that the proposed scheme is of great security, robustness, and efficiency

  • An innovative hybrid chaotic mapping system has been crafted through compositing with three classic chaotic maps

Read more

Summary

A New Hybrid Chaotic Map and Its Application on Image Encryption and Hiding

College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China. A new hybrid chaotic map is constructed in this paper and applied to image encryption and hiding. MD5 is used as part of initial condition and control parameter to perturb the trajectory in order to further increase the security against plaintext-chosen attacks and differential attacks. Ciphered image is embedded into several carrier images to reduce suspiciousness and to increase robustness. The results demonstrate that the proposed scheme is of great security, robustness, and efficiency

Introduction
The New Hybrid Chaotic Map
Chaos-Based Image Processing Scheme
Encryption Scheme
Experimental Results
Security and Performance Analysis
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.