IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Analysis of Color Image Encryption Using Multidimensional Bogdanov Map

Analysis of Color Image Encryption Using Multidimensional Bogdanov Map
View Sample PDF
Author(s): R. N. Ramakant Parida (Kalinga Institute of Industrial Technology, India), Swapnil Singh (Kalinga Institute of Industrial Technology, India)and Chittaranjan Pradhan (Kalinga Institute of Industrial Technology, India)
Copyright: 2019
Pages: 24
Source title: Histopathological Image Analysis in Medical Decision Making
Source Author(s)/Editor(s): Nilanjan Dey (Techno India College of Technology, India), Amira S. Ashour (Tanta University, Egypt), Harihar Kalia (Seemantha Engineering College, India), R.T. Goswami (Techno India College of Technology, India)and Himansu Das (KIIT University, India)
DOI: 10.4018/978-1-5225-6316-7.ch009

Purchase

View Analysis of Color Image Encryption Using Multidimensional Bogdanov Map on the publisher's website for pricing and purchasing information.

Abstract

Image encryption is a main concern in digital transmission of data over communication network. As encryption and decryption of image has got considerable attention in the past decades, its effectiveness and compatibility need to be taken care of. The work reported in this chapter is mainly concerned with enhancement of dimension in image encryption technique. The work mainly deals with pixels shuffling of an image using Bogdanov chaotic map for both gray and color image, where encryption and decryption process are associated with the key. In color image, the image is divided into all three planes (RGB) individually. Scrambling is done with all three planes individually. All the three planes are summed up into a single plane which gives us the final result. In Bogdanov map, old pixel position is replaced with new pixel position. Further, the authors analyzed security of image encryption techniques with two parameters called NPCR and UACI. The efficacy of the encryption process can be seen in experimental results.

Related Content

Amy Moy. © 2022. 19 pages.
Kristen L. Kerber. © 2022. 11 pages.
Kristen L. Kerber. © 2022. 12 pages.
Gayathri Srinivasan. © 2022. 23 pages.
Jacky K. W. Kong. © 2022. 19 pages.
Iason Mantagos. © 2022. 11 pages.
M. H. Esther Han. © 2022. 29 pages.
Body Bottom