Show simple item record

dc.contributor.authorJolfaei, Alireza
dc.contributor.authorMatinfar, Ahmadreza
dc.contributor.authorMirghadri, Abdolrasoul
dc.date.accessioned2019-03-28T00:47:37Z
dc.date.available2019-03-28T00:47:37Z
dc.date.issued2015
dc.identifier.issn1751-9128
dc.identifier.doi10.1504/IJESDF.2015.070389
dc.identifier.urihttp://hdl.handle.net/10072/141025
dc.description.abstractConfidentiality of digital images is an important requirement for many multimedia applications and services. To maintain confidentiality, encryption of digital images is essential. Digital images are usually very large and encrypting such bulky data induces many performance overheads, which can be too expensive for real-time applications in resource constrained environments. In this paper, we propose a chaotic image encryption scheme which satisfies the need for both lightweightedness and security. To justify the security and efficiency, the new cipher was evaluated using a series of statistical tests. These tests included a visual testing and a histogram analysis, a randomness analysis, a correlation analysis, an entropy analysis and an image encryption quality analysis. Based on all analyses and experimental results, it is concluded that the proposed scheme is effective, efficient and trustworthy and therefore can be adopted for image encryption.
dc.description.peerreviewedYes
dc.languageenglish
dc.language.isoeng
dc.publisherInderscience Publishers
dc.relation.ispartofpagefrom258
dc.relation.ispartofpageto277
dc.relation.ispartofissue3
dc.relation.ispartofjournalInternational Journal of Electronic Security and Digital Forensics
dc.relation.ispartofvolume7
dc.subject.fieldofresearchInformation and Computing Sciences not elsewhere classified
dc.subject.fieldofresearchOther Information and Computing Sciences
dc.subject.fieldofresearchCriminology
dc.subject.fieldofresearchcode089999
dc.subject.fieldofresearchcode0899
dc.subject.fieldofresearchcode1602
dc.titlePreserving the confidentiality of digital images using a chaotic encryption scheme
dc.typeJournal article
dc.type.descriptionC1 - Articles
dc.type.codeC - Journal Articles
dc.description.versionAccepted Manuscript (AM)
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2015 Inderscience Publishers. This is the author-manuscript version of this paper. Reproduced in accordance with the copyright policy of the publisher. Please refer to the journal website for access to the definitive, published version.
gro.hasfulltextFull Text
gro.griffith.authorJolfaei, Alireza


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record