Abstract
This paper mainly studies the scrambling technology of digital image; discussing the image hashing algorithm based on Joseph Traverse. This paper explains the image encryption process based on Josephus, and use Matlab to encrypt different pictures and screenshot. At the same time, analyzed the Key sensitivity and Correlation algorithm, and judge the effect of encryption algorithm by compare original image with each encrypt image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yen JC, Guo JI (1999) A new image encryption algorithm and its VLSI architecture. In: Proceedings of IEEE workshop on signal processing systems, IEEE Press, Washington DC, pp 430–437
Yen JC, Guo JI (2000) A new chaotic key-based design for image encryption and decryption. In: Proceedings of IEEE international symposium on circuits and systems, IEEE Press, Washington DC, pp 49–52
Yen JC, Guo JI (2000) Efficient hierar-chical chaotic image encryption algorithm and its VLSI realisation. In: IEEE Proceedings of visual image signal process, vol 147(2), pp 167–175
Yen JC, Guo JI (2002) Design of a new signal security system. In: IEEE Proceedings of international symposium on circuits and systems, vol (4), pp 121–124
Chen HC, Yen JC, Guo JI (2002) Design of a new cryptography system. Springer, Berlin
Claudio R Mirasso (2002) Chaos shift-keying encryption in chaotic external-cavity semiconductor lasers using a single-receiver scheme. IEEE Photonic Technol Lett 14(4):456–458
Wong KW (2002) A fast chaotic cryptography scheme with dynamic look-up table. Phys Lett A 298(4):238–242
Wong KW, Ho SW, Yung CK (2003) A chaotic cryptography scheme for generating short ciphertext. Phys LettA 310(1):67–73
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this paper
Cite this paper
Wu, J., Tu, L. (2014). An Image Encryption Algorithm Based on Josephus Traversing and Position Disordering. In: Zhong, S. (eds) Proceedings of the 2012 International Conference on Cybernetics and Informatics. Lecture Notes in Electrical Engineering, vol 163. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3872-4_248
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3872-4_248
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3871-7
Online ISBN: 978-1-4614-3872-4
eBook Packages: EngineeringEngineering (R0)