Title :
Secret-Image Sharing for Multimedia Chaotic Encryption
Author :
Hamdi, Mohamed ; Boudriga, Noureddine
Author_Institution :
Commun. Networks & Security Res. Lab., Univ. of 7th of November at Carthage, Carthage
Abstract :
With the noteworthy advance in visual sensing and image analysis techniques, image data are used in many sensitive applications including military surveillance, health-care, and meteorology. The possibility for images to be intercepted, as well as the criticality of the application contexts, make the need for robust image encryption of utmost importance. This is exacerbated by the fact that the existing standard symmetric ciphers do not adapt to the intrinsic image features. To fulfill the image security requirements, chaotic ciphers have been the most used approaches. The idea of using 2-D chaotic maps to design permutation-based image encryption schemes was initially proposed assuming that the size of the plain-image is H x W.
Keywords :
chaos; cryptography; image coding; multimedia systems; 2D chaotic map; image analysis technique; image interception; image security requirement; multimedia chaotic cipher encryption; permutation-based image encryption scheme; secret-image sharing; standard symmetric cipher; visual sensing; Chaos; Chaotic communication; Communication networks; Cryptography; Data security; Histograms; Image analysis; Lattices; Pixel; Surveillance;
Conference_Titel :
Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on
Conference_Location :
Damascus
Print_ISBN :
978-1-4244-1751-3
Electronic_ISBN :
978-1-4244-1752-0
DOI :
10.1109/ICTTA.2008.4530284