Open Access
Subscription Access
Open Access
Subscription Access
A Novel Approach to Improve Image Storage and Security By Using Chaotic Image Encryption Method And Lossless Compression Method
Subscribe/Renew Journal
In present day life, even common men share confidential information among themselves through social media. This research work could be developed as a plug-in module which performs encryption and decryption and added to those presently available apps. This ensures a high-level end to end encryption. Besides the encryption performed in Adhoc networks where local nodes are interconnected to establish a communication, this research proposal could be added into the existing encryption layer. Such embedded encryption would increase the security levels in industries whose processes are controlled and operated via WIFI networks. Even RFID reader and tags could enjoy this encryption scheme. In chaotic based systems, usually logistic maps are used and the lattice values are modified through several iterations and finally forms a spatio-temporal system. Since linear coupling of lattices results in easy guessing of pixels, non-linear coupling is getting popular among chaotic based encryption systems. Such non-linear spatio-temporal chaotic systems are able to provide sufficient amount of security to the host image. However, intruders have their own way to decrypt either using ‘Trial and Error’ methods or through mathematical analysis of the encrypted images. So, the task of the researcher is to improve the chaotic metrics ideally by realizing the key space (to be of infinite size) and zero amount of information to be stolen except the encrypted pixels in the hands of intruders. Further decryption by the intended users is still a challenge even though the keys are known because; the quality of the host image should be preserved. Another challenge to the researcher is, to perform compression in order to save the storage area in concerned servers. Naturally compression and decompression are considered to be a valid attack on encryption methods. But in our Case, compression is done intentionally for saving storage area and bandwidth.
Keywords
Chaotic Systems, ACGLML, Bifurcation Diagram, Arnold’s Cat Map, Lattice Variation.
Subscription
Login to verify subscription
User
Font Size
Information
Abstract Views: 319
PDF Views: 0