ARTICLE
TITLE

Image Encryption Using Chaotic Cat Mapping in the Discrete Fourier Transform

SUMMARY

The paper presents an secure image using the two dimensional chaotic cat mapping  (2D-CCM) in the Discrete Fourier Transform domain (DFT). The ciphering phase begins by applying the DFT on the plainimage to be encrypted and the resulted Fourier transformed image are scrambled using the 2D-CCM and finally an inverse DFT is applied to obtain the final encrypted image. The decryption phase applies a reverse  procedure to get the original plainimage. A set of encryption test experiments are employed to inspect the proposed DFT based 2D-CCM image cryptosystem. The experimental results verified and confirmed the superiority of the proposed DFT based 2D-CCM image cryptosystem.

 Articles related

Jingyu Peng,Sheng-rong Gong    

In order to encrypt and compress a color image simultaneously, an encryption and compression algorithm for color image was proposed based on a hyperchaotic system. A hyperchaotic system was utilized to make a pure white image into a uniform distribution ... see more


Ram Ratan, Arvind Yadav    

A selective bit-plane encryption scheme was proposed for securing the transmission of image data in mobile environments with a claim that it provides a high security viz. the encryption of the four most significant bit-planes is sufficient for a high ima... see more


Mohammed H. Rasheed,Omar M. Salih,Mohammed M. Siddeq    

This research proposes a new image compression and encryption method depend on a modified JPEG technique combined with the Hexa-Coding algorithm. The compression algorithm starts by dividing an image into 8x8 blocks, then DCT (Discrete Cosine Transform) ... see more


(1) Achmad Fanany Onnilita Gaffar (Politeknik Negeri Samarinda, Indonesia) (2) Rheo Malani (Politeknik Negeri Samarinda, Indonesia) (3) Arief Bramanto Wicaksono Putra (Politeknik Negeri Samarinda, Indonesia)    

In principle, the image encryption algorithm produces an encrypted image. The encrypted image is composed of arbitrary patterns that do not provide any clues about plain image and its cipher key. Ideally, the encrypted image is entirely independent of it... see more


V. Suresh, C.E. Veni Madhavan    

Conventional encryption techniques are usually applicable for text data and often unsuited for encrypting multimedia objects for two reasons. Firstly, the huge sizes associated with multimedia objects make conventional encryption computationally costly. ... see more