Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/76338
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Orawit Thinnukool | en_US |
dc.contributor.author | Thammarat Panityakul | en_US |
dc.contributor.author | Mahwish Bano | en_US |
dc.date.accessioned | 2022-10-16T07:08:31Z | - |
dc.date.available | 2022-10-16T07:08:31Z | - |
dc.date.issued | 2021-01-01 | en_US |
dc.identifier.issn | 15462226 | en_US |
dc.identifier.issn | 15462218 | en_US |
dc.identifier.other | 2-s2.0-85113528090 | en_US |
dc.identifier.other | 10.32604/cmc.2021.019153 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85113528090&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/76338 | - |
dc.description.abstract | In the most recent decades, a major number of image encryption plans have been proposed. The vast majority of these plans reached a high security level; however, their moderate speeds because of their complicated processes made them of no use in real-time applications. Inspired by this, we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide. In contrast to the most of current plans, we utilize this basic map to create just a couple of arbitrary rows and columns. Moreover, to additionally speed up, we raise the processing unit from the pixel level to the row/column level. The security of the new plot is accomplished through a substitution permutation network, where we apply a circular shift of rows and columns to break the solid connection of neighboring pixels. At that point, we join the XOR operation with modulo function to cover the pixels values and forestall any leaking of data. High-security tests and simulation analyses are carried out to exhibit that the scheme is very secure and exceptionally quick for real-time image processing at 80 fps (frames per second). | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Engineering | en_US |
dc.subject | Materials Science | en_US |
dc.subject | Mathematics | en_US |
dc.title | Double encryption using trigonometric chaotic map and XOR of an image | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | Computers, Materials and Continua | en_US |
article.volume | 69 | en_US |
article.stream.affiliations | Air University Islamabad | en_US |
article.stream.affiliations | Prince of Songkla University | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.