
Randomized Poly-encrypted Image Exploiting Chaotic Beheviour
Author(s) -
Bouslehi Hamdi,
Hassene Seddik,
Amaria Wael
Publication year - 2022
Publication title -
international journal of mathematical models and methods in applied sciences
Language(s) - English
Resource type - Journals
ISSN - 1998-0140
DOI - 10.46300/9101.2022.16.5
Subject(s) - encryption , computer science , image (mathematics) , chaotic , digital data , block (permutation group theory) , data transmission , data security , transmission (telecommunications) , digital image , theoretical computer science , computer security , data mining , algorithm , computer network , artificial intelligence , mathematics , image processing , telecommunications , geometry
The security of digital data has become an essential need. Because the storage, transmission of data social networking has became inevitable, the need to ensure that data is no longer a luxury but an absolute necessity. The picture takes a large part of the data and its presence every day more important. in this paper, we use a new technique encryption which is poly encryption, this technique is based on the Decomposition of the image in a random manner, and each block will be encrypted by an algorithm that used different algorithm