Image merger encryptor: A chaotic and chebyshev key approach

4Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

In the rapid development of various expertises, the information can be misplaced, misused and damaged. To overcome these vulnerabilities, the information security is eminent. Information security ensures the authorized people to access the precise information when they are needed and cannot be customized without authorization. To prevent the access of information from the illegal user and destruction several encryption techniques are used. Multilevel and double image encryption method are proposed this work to achieve the high level secrecy and better performance. The novel double image encryption technique based on cross image pixel scrambling in Fourier domain and chaotic maps are used to achieve the multilevel encryption. The statistical and security test are tested on Digital Imaging and Communication in Medicine (DICOM) images.

Cite

CITATION STYLE

APA

Praveenkumar, P., Nisha, R., Thenmozhi, K., Rayappan, J. B. B., & Amirtharajan, R. (2016). Image merger encryptor: A chaotic and chebyshev key approach. Research Journal of Information Technology, 8(1–2), 10–16. https://doi.org/10.3923/rjit.2016.10.16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free