News Updates Monday 25th Nov 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Chaos Based Information Securty in Multimedia Communication


Author : Priyanka Tiwari, Mukesh Kumar, A.K. Jaiswal, and Rohini Saxena

Pages : 1296-1300
Download PDF
Abstract

In Wireless networks, the security of data and information has important role in digital communication and multimedia communication. Different types of encryption algorithms have an important role to provide the security to the wireless networks. Cryptography basically used for the data confidentiality and privacy by making indiscernible. Hence the original data cannot be interrupted by the unauthenticated user. The encryption techniques and different types of useful algorithms are used to provide the more security to the applications. In this paper the well- known method chaotic algorithm is used. Chaotic algorithm is used in real time secure image transmission systems. This algorithm is very popular method used in Research for encryption and decryption process. The combination of chaotic theory and cryptography has an very important role in Information Security. In this communication, a new image encryption algorithm based on chaotic map is proposed for gray scale 2D image. In this proposed algorithm, the plain or original image is taken which has MXN dimension. Then Redistribute the pixel pair wise by deciding the parameters for relocating which is only known to the authenticated owner. Using this process all pixels are scrambled in entire image with the help of iteratively to optimize the scattering of energy.

Keywords: Information Security, Image encryption, Chaotic algorithm, Scrambling, Authentication key,MATLAB10

Article published in International Journal of Current  Engineering  and Technology, Vol.4,No.3 (June- 2014)

 

 

Call for Papers
  1. IJCET- Current Issue
  2. Issues are published in Feb, April, June, Aug, Oct and Dec
  3. DOI is given to all articles
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved