Chaotic Maps
13 Followers
Recent papers in Chaotic Maps
In this paper generation of binary sequences derived from chaotic sequences defined over Z4 is proposed. The six chaotic map equations considered in this paper are Logistic map, Tent Map, Cubic Map, Quadratic Map and Bernoulli Map.... more
There is a significant increase in the number of multimedia transmission over the internet is beyond our dreams. Thus, the increased risk of losing or altering the data during transit is more. Protection of this multimedia data becomes... more
This paper presents a novel approach of building a secure data hiding technique in digital images. The image steganography technique takes the advantage of limited power of human visual system (HVS). It uses image as cover media for... more
As we live and revel in a digital age, the day to day transmission of multimedia data over the internet is beyond our imaginations. Consequently, the increased risk of losing or altering the data during transit is more. Protection of... more
This paper presents a novel approach of building a secure data hiding technique in digital images. The image steganography technique takes the advantage of limited power of human visual system (HVS). It uses image as cover media for... more
The image encryption and decryption is the one of the ways to providing security to digital image. Encryption technique is a process of converting plain image into a cipher image. Decryption technique is a process of converting cipher... more
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than... more
—Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark's resistance against common processing. Many watermarking schemes emphasize robustness more than... more
This paper presents the new Lorenz unlike chaotic attractor which is constructed by a three non linear first order differential equations. These equations are arranged in a three dimensional autonomous systems. The dynamic behavior of the... more
These paper presents the novel idea about the various image ecryption processes available specifically the encryption of the image by using chaos theory .In the recent age of communication allows us to transfer any of the information... more
A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based... more
Public key cryptography has received great attention in the field of information exchange through insecure channels. In this paper, we combine the Dependent-RSA (DRSA) and chaotic maps (CM) to get a new secure cryptosystem, which depends... more
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission.... more
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more... more