TELKOMNIKA Telecommunication Computing Electronics and Control
Medical image encryption using multi chaotic maps
Dublin Core
Title
TELKOMNIKA Telecommunication Computing Electronics and Control
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
Subject
3DES
Chaotic maps
Cryptography
Medical images
TCP/IP
Chaotic maps
Cryptography
Medical images
TCP/IP
Description
Over the last twenty years, chaos-based encryption has been an increasingly
popular way to encrypt and decrypt data using nonlinear dynamics and
deterministic chaos. Discrete chaotic systems based on iterative maps have
gotten a lot of interest because of their simplicity and speed. In this paper,
three kinds of chaotic maps are utilized to build a digital image encryption
strategy depending on a chaotic system. These chaotic maps are the logistic
map, Arnold Cat’s map, and Baker’s map. In addition to using the triple data
encryption standard (3DES) encryption scheme with the chaotic maps
mentioned. The results of the experiments revealed that the suggested digital
image encryption technique is both efficient and secure, making it ideal for
usage in insecure networks. The transmission control protocol
(TCP)/internet protocol (IP) protocol was used for the purpose of
transferring data from server to client through the network and vice versa.
popular way to encrypt and decrypt data using nonlinear dynamics and
deterministic chaos. Discrete chaotic systems based on iterative maps have
gotten a lot of interest because of their simplicity and speed. In this paper,
three kinds of chaotic maps are utilized to build a digital image encryption
strategy depending on a chaotic system. These chaotic maps are the logistic
map, Arnold Cat’s map, and Baker’s map. In addition to using the triple data
encryption standard (3DES) encryption scheme with the chaotic maps
mentioned. The results of the experiments revealed that the suggested digital
image encryption technique is both efficient and secure, making it ideal for
usage in insecure networks. The transmission control protocol
(TCP)/internet protocol (IP) protocol was used for the purpose of
transferring data from server to client through the network and vice versa.
Creator
Abbas Zamil Hussain, Maisa’a Abid Ali Khodher
Source
http://telkomnika.uad.ac.id
Date
Dec 28, 2022
Contributor
peri irawan
Format
pdf
Language
english
Type
text
Files
Collection
Citation
Abbas Zamil Hussain, Maisa’a Abid Ali Khodher, “TELKOMNIKA Telecommunication Computing Electronics and Control
Medical image encryption using multi chaotic maps,” Repository Horizon University Indonesia, accessed May 14, 2025, https://repository.horizon.ac.id/items/show/4551.
Medical image encryption using multi chaotic maps,” Repository Horizon University Indonesia, accessed May 14, 2025, https://repository.horizon.ac.id/items/show/4551.