z-logo
open-access-imgOpen Access
Public key cryptosystem based on multiple chaotic maps for image encryption
Author(s) -
Yousif S. Najaf,
Mahir K. Mahmood
Publication year - 2021
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v22.i3.pp1457-1466
Subject(s) - key space , encryption , key (lock) , cryptosystem , chaotic , public key cryptography , computer science , image (mathematics) , chaos (operating system) , theoretical computer science , cryptography , chebyshev filter , computer security , algorithm , computer vision , artificial intelligence
Image is one of the most important forms of information. In this paper, two public key encryption systems are proposed to protect images from various attacks. Both systems depend on generating a chaotic matrix ( I ) using multiple chaotic maps. The parameters for these maps are taken from the shared secret keys generated from Chebyshev map using public keys for Alice and secret key for Bob or vice versa. The second system has the feature of deceiving the third party for searching for fake keys. Analysis and tests showed that the two proposed systems resist various attacks and have very large key space. The results are compared with other chaos based systems to show the superiority of these two proposed systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here