O'Reilly logo

Multimedia Security by Frank Y. Shih

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

19

Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption

Di Xiao and Frank Y. Shih

19.1  INTRODUCTION

With rapid development and wide applications in digital technology, the security of digital images has attracted increasing attention. Applying the merits of chaos to protect image security is a promising research field. In order to achieve significant confusion and diffusion, a chaotic image encryption scheme typically includes two stages: the first stage is to permute all the pixels of an image as a whole by using a two-dimensional (2D) chaotic map, and the second stage is to change the entire pixel values of the permutated image sequentially. To the best of our knowledge, this scheme ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required