Many methods have been put forth to perform image encryption using Chaotic Neural Networks. In this paper, another method of chaotic image encryption called the “Triple-Key” method is introduced. In this method, it is required to enter an 80-bit session key in addition to the initial parameter key and the control parameter key. Each of the keys forms just one part of the lock that needs to be opened to obtain the original image. The position of bits in the 80-bit key determines the scrambling of individual pixels in the encrypted image. Results reveal a very low Correlation coefficient between adjacent pixels in the encrypted image, which implies higher security and lower probability of security breach through brute force attacks or statistical analysis. The software was realized using MATLAB.
[1]
C. Wu,et al.
Studying chaos via 1-D maps-a tutorial
,
1993
.
[2]
Vinod Patidar,et al.
Image encryption using chaotic logistic map
,
2006,
Image Vis. Comput..
[3]
Shiguo Lian,et al.
A novel image encryption scheme based-on JPEG encoding
,
2004,
Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004..
[4]
Jiun-In Guo,et al.
EURASIP Journal on Applied Signal Processing 2003:13, 1291–1305 c ○ 2003 Hindawi Publishing Corporation Design and Realization of a New Signal Security System for Multimedia Data Transmission
,
2003
.
[5]
L. Kocarev,et al.
Chaos and cryptography: block encryption ciphers based on chaotic maps
,
2001
.