{"title":"一种有效的基于图像系统的灰狼优化方法,利用基于约熵的三维混沌映射实现多媒体图像安全","authors":"Srinivas Koppu, V. M. Viswanatham","doi":"10.1504/ijcaet.2020.10029297","DOIUrl":null,"url":null,"abstract":"Chaotic maps play an important role in information sharing. In this paper a grey wolf optimiser used with reduced entropy-based 3D chaotic map. The selection and high coefficients are selected based on the reduced entropy value to identify the optimised parameters to get unpredictable random values. Time complexity, autocorrelation of V, H and D elements, histogram of original and cipher images, peak signal to noise ratio and NPCR and UACI values are computed from the cipher image. The empirical results show the proposed method provides good, better imperceptibility and defends various attacks. To prove this accomplishment of the method, several experiments were conducted and compared the results with existing systems.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An efficient image system-based grey wolf optimiser method for multimedia image security using reduced entropy-based 3D chaotic map\",\"authors\":\"Srinivas Koppu, V. M. Viswanatham\",\"doi\":\"10.1504/ijcaet.2020.10029297\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Chaotic maps play an important role in information sharing. In this paper a grey wolf optimiser used with reduced entropy-based 3D chaotic map. The selection and high coefficients are selected based on the reduced entropy value to identify the optimised parameters to get unpredictable random values. Time complexity, autocorrelation of V, H and D elements, histogram of original and cipher images, peak signal to noise ratio and NPCR and UACI values are computed from the cipher image. The empirical results show the proposed method provides good, better imperceptibility and defends various attacks. To prove this accomplishment of the method, several experiments were conducted and compared the results with existing systems.\",\"PeriodicalId\":346646,\"journal\":{\"name\":\"Int. J. Comput. Aided Eng. Technol.\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Comput. Aided Eng. Technol.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijcaet.2020.10029297\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Comput. Aided Eng. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijcaet.2020.10029297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An efficient image system-based grey wolf optimiser method for multimedia image security using reduced entropy-based 3D chaotic map
Chaotic maps play an important role in information sharing. In this paper a grey wolf optimiser used with reduced entropy-based 3D chaotic map. The selection and high coefficients are selected based on the reduced entropy value to identify the optimised parameters to get unpredictable random values. Time complexity, autocorrelation of V, H and D elements, histogram of original and cipher images, peak signal to noise ratio and NPCR and UACI values are computed from the cipher image. The empirical results show the proposed method provides good, better imperceptibility and defends various attacks. To prove this accomplishment of the method, several experiments were conducted and compared the results with existing systems.