Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorKaçar, Sezgin
dc.contributor.authorÇavuşoğlu, Ünal
dc.contributor.authorJahanshahi, Hadi
dc.date.accessioned2024-09-03T10:29:28Z
dc.date.available2024-09-03T10:29:28Z
dc.date.issued2024en_US
dc.identifier.citationMao, Y., & Chen, G. (2005). Chaos-Based Image Encryption. Springer EBooks, 231–265. https://doi.org/10.1007/3-540-28247-5_8 ‌en_US
dc.identifier.urihttps://doi.org/10.1016/B978-0-44-318468-0.00009-X
dc.identifier.urihttps://hdl.handle.net/20.500.14002/2679
dc.description.abstractChaos-based encryption applications are at the forefront of engineering applications based on chaotic systems. When the studies in the literature are examined, it is seen that chaos-based image encryption applications are widely used. The randomness and unpredictable dynamic behavior of chaotic systems make chaos-based encryption applications very useful. For this reason, chaos-based image encryption is handled in a separate chapter here. In this chapter, first, continuous and discrete-time chaotic systems are mentioned and the chaos-based image encryption studies carried out in recent years are examined. The reason for this is to reflect the main effects of continuous-time or discrete-time systems on chaos-based image encryption. In addition, integer-order, fractional-order, and variable-order systems are also discussed and their use in image encryption applications is seen. Then, the methods used in encryption applications are introduced and the analysis methods used in chaos-based image encryption applications are explained. In the explanations about chaos-based image encryption applications, the commonly used steps for these applications are discussed. As these steps, numerical solutions of chaotic systems, random number generation operations, randomness tests, and encryption operations using the xor operation are explained. Security analysis, which is another process that needs to be performed regarding chaos-based image encryption, is also included in this chapter. In the literature, entropy, correlation, differential attack, histogram, keyspace analysis, which are the most widely used analysis methods for chaos-based image encryption, are explained. Although widely used in the literature, chaos-based encryption methods also have advantages and disadvantages. Therefore in this chapter, the security evaluation of chaos-based encryption algorithms is also presented. In particular, the convenience and effectiveness of these methods in practice are stated. On the other hand, the aspects that are not accepted according to the classical cryptology approach are also emphasized. Finally, a case study on medical images is handled with a chaos-based image encryption algorithm and the results of the case study are presented. In this application, numerical solutions and random numbers are obtained by using a classic 4D chaotic system. Then, the encryption process is carried out by xoring with the random numbers. The resulting encrypted image is analyzed and the results are presented.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.relation.ispartofIntelligent Fractal-Based Image Analysis: Applications in Pattern Recognition and Machine Visionen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.titleChaos-based image encryptionen_US
dc.typebooken_US
dc.authorid0000-0002-5171-237Xen_US
dc.departmentFakülteler, Teknoloji Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.institutionauthorKaçar, Sezgin
dc.institutionauthorÇavuşoğlu, Ünal
dc.identifier.doi10.1016/B978-0-44-318468-0.00009-Xen_US
dc.identifier.startpage47en_US
dc.identifier.endpage71en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.authorscopusid36782511000en_US
dc.authorscopusid56157623400en_US
dc.authorscopusid57193898012en_US
dc.identifier.scopus2-s2.0-85199150141en_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster