An Image Encryption Algorithm Based on Josephus Traversing and Position Disordering

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 163)

Abstract

This paper mainly studies the scrambling technology of digital image; discussing the image hashing algorithm based on Joseph Traverse. This paper explains the image encryption process based on Josephus, and use Matlab to encrypt different pictures and screenshot. At the same time, analyzed the Key sensitivity and Correlation algorithm, and judge the effect of encryption algorithm by compare original image with each encrypt image.

Keywords

Image encryption Josephus traversing Position disordering 

References

  1. 1.
    Yen JC, Guo JI (1999) A new image encryption algorithm and its VLSI architecture. In: Proceedings of IEEE workshop on signal processing systems, IEEE Press, Washington DC, pp 430–437Google Scholar
  2. 2.
    Yen JC, Guo JI (2000) A new chaotic key-based design for image encryption and decryption. In: Proceedings of IEEE international symposium on circuits and systems, IEEE Press, Washington DC, pp 49–52Google Scholar
  3. 3.
    Yen JC, Guo JI (2000) Efficient hierar-chical chaotic image encryption algorithm and its VLSI realisation. In: IEEE Proceedings of visual image signal process, vol 147(2), pp 167–175Google Scholar
  4. 4.
    Yen JC, Guo JI (2002) Design of a new signal security system. In: IEEE Proceedings of international symposium on circuits and systems, vol (4), pp 121–124Google Scholar
  5. 5.
    Chen HC, Yen JC, Guo JI (2002) Design of a new cryptography system. Springer, BerlinGoogle Scholar
  6. 6.
    Claudio R Mirasso (2002) Chaos shift-keying encryption in chaotic external-cavity semiconductor lasers using a single-receiver scheme. IEEE Photonic Technol Lett 14(4):456–458Google Scholar
  7. 7.
    Wong KW (2002) A fast chaotic cryptography scheme with dynamic look-up table. Phys Lett A 298(4):238–242Google Scholar
  8. 8.
    Wong KW, Ho SW, Yung CK (2003) A chaotic cryptography scheme for generating short ciphertext. Phys LettA 310(1):67–73CrossRefMATHMathSciNetGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Center of NetworkHunan City UniversityYiyangChina
  2. 2.Department of Computer ScienceHunan City UniversityYiyangChina

Personalised recommendations