{"title":"一种利用混沌逻辑映射和流密码对图像进行加密的新方法","authors":"M. Rani, Sudesh Kumar","doi":"10.1109/ICGCIOT.2015.7380694","DOIUrl":null,"url":null,"abstract":"This research gives a novel approach for fast encryption of images using chaotic maps and pixel shuffling using modified RC4 stream cipher algorithm. In this, the given image will be first divided into the three blocks of same size which represents red, green and blue color intensity matrices respectively. These 2d blocks will the converted to horizontal vectors and these vectors will then undergo from a series of bit shuffling process. These independent blocks will then be encrypted using proposed algorithm and then transmitted to the network after reconciling these blocks. The key space for this proposed algorithm is 2192. The user key is 120 bit and the rest 72 bit is appended at run time to generate a dynamic key for each encryption process.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"144 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher\",\"authors\":\"M. Rani, Sudesh Kumar\",\"doi\":\"10.1109/ICGCIOT.2015.7380694\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This research gives a novel approach for fast encryption of images using chaotic maps and pixel shuffling using modified RC4 stream cipher algorithm. In this, the given image will be first divided into the three blocks of same size which represents red, green and blue color intensity matrices respectively. These 2d blocks will the converted to horizontal vectors and these vectors will then undergo from a series of bit shuffling process. These independent blocks will then be encrypted using proposed algorithm and then transmitted to the network after reconciling these blocks. The key space for this proposed algorithm is 2192. The user key is 120 bit and the rest 72 bit is appended at run time to generate a dynamic key for each encryption process.\",\"PeriodicalId\":400178,\"journal\":{\"name\":\"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"volume\":\"144 4\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGCIOT.2015.7380694\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2015.7380694","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher
This research gives a novel approach for fast encryption of images using chaotic maps and pixel shuffling using modified RC4 stream cipher algorithm. In this, the given image will be first divided into the three blocks of same size which represents red, green and blue color intensity matrices respectively. These 2d blocks will the converted to horizontal vectors and these vectors will then undergo from a series of bit shuffling process. These independent blocks will then be encrypted using proposed algorithm and then transmitted to the network after reconciling these blocks. The key space for this proposed algorithm is 2192. The user key is 120 bit and the rest 72 bit is appended at run time to generate a dynamic key for each encryption process.