{"title":"Color image encryption algorithm with realitypreserving fractional discrete cosine transform and spatiotemporal chaotic mapping","authors":"Liang Ya-ru, Liu Guo-ping, Wu Jian-hua","doi":"10.1109/ICAIOT.2015.7111546","DOIUrl":null,"url":null,"abstract":"A color image encryption scheme is proposed based on a reality-preserving fractional discrete cosine transform (RPFrDCT) and spatiotemporal chaotic mapping. The scrambling and diffusion operations are carried out after the RPFrDCT and make three components of image affect each other. The main advantages of this scheme are the real-valued output, the nonlinear manipulation, the high sensitiveness and high robustness to the cipher keys. Experimental results demonstrate that the proposed encryption scheme is feasible and effective.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"134 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIOT.2015.7111546","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
A color image encryption scheme is proposed based on a reality-preserving fractional discrete cosine transform (RPFrDCT) and spatiotemporal chaotic mapping. The scrambling and diffusion operations are carried out after the RPFrDCT and make three components of image affect each other. The main advantages of this scheme are the real-valued output, the nonlinear manipulation, the high sensitiveness and high robustness to the cipher keys. Experimental results demonstrate that the proposed encryption scheme is feasible and effective.