Ismail Haddad, A. Belmeguenai, Djamel Herbadji, S. Boumerdassi
{"title":"基于三维分数阶混沌系统的彩色图像加密新方法","authors":"Ismail Haddad, A. Belmeguenai, Djamel Herbadji, S. Boumerdassi","doi":"10.1109/STA56120.2022.10019142","DOIUrl":null,"url":null,"abstract":"With the fast evolution of communication networks, it has become essential to protect images while they are being transmitted over these networks.This work introduces a method for image encryption utilizing a fractional chaotic system. Firstly, we divide the image into R, B and G layers. Then we convert each layer into a vector, then we change the pixels of each vector by using a set of indices provided by the fractional chaotic system, also we shift the pixels of vectors by using steps number. Next, we employ a procedure called XOR to get the ciphered image. The excellent performance of the suggested algorithm was demonstrated by a range of analyses, such as histogram analysis, correlation test and sensitivity analysis. also, it can withstand a variety of conventional attacks","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A New Encryption Approach For Color Image Using 3D Fractional Order Chaotic System\",\"authors\":\"Ismail Haddad, A. Belmeguenai, Djamel Herbadji, S. Boumerdassi\",\"doi\":\"10.1109/STA56120.2022.10019142\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the fast evolution of communication networks, it has become essential to protect images while they are being transmitted over these networks.This work introduces a method for image encryption utilizing a fractional chaotic system. Firstly, we divide the image into R, B and G layers. Then we convert each layer into a vector, then we change the pixels of each vector by using a set of indices provided by the fractional chaotic system, also we shift the pixels of vectors by using steps number. Next, we employ a procedure called XOR to get the ciphered image. The excellent performance of the suggested algorithm was demonstrated by a range of analyses, such as histogram analysis, correlation test and sensitivity analysis. also, it can withstand a variety of conventional attacks\",\"PeriodicalId\":430966,\"journal\":{\"name\":\"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/STA56120.2022.10019142\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STA56120.2022.10019142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Encryption Approach For Color Image Using 3D Fractional Order Chaotic System
With the fast evolution of communication networks, it has become essential to protect images while they are being transmitted over these networks.This work introduces a method for image encryption utilizing a fractional chaotic system. Firstly, we divide the image into R, B and G layers. Then we convert each layer into a vector, then we change the pixels of each vector by using a set of indices provided by the fractional chaotic system, also we shift the pixels of vectors by using steps number. Next, we employ a procedure called XOR to get the ciphered image. The excellent performance of the suggested algorithm was demonstrated by a range of analyses, such as histogram analysis, correlation test and sensitivity analysis. also, it can withstand a variety of conventional attacks