mariel YEPDIA - Academia.edu (original) (raw)

Papers by mariel YEPDIA

Research paper thumbnail of Multiple Image Fusion Encryption (MIFE) using Discrete Cosine Transformation (DCT) and Chaotic Generators

This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of water... more This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of watermarked images and new chaotic generators. Logistic-May (LM), May-Gaussian (MG), and Gaussian-Gompertz (GG) were used as chaotic generators for their good properties in order to correct the flaws of 1D chaotic maps (Logistic, May, Gaussian, Gompertz) when used individually. Firstly, the discrete cosine transformation (DCT) and the low-pass filter of appropriate sizes are used to combine the target watermarked images in the spectral domain in two different multiplex images. Secondly, each of the two images is concatenated into blocks of small size, which are mixed by changing their position following the order generated by a chaotic sequence from the Logistic-May system (LM). Finally, the fusion of both scrambled images is achieved by a nonlinear mathematical expression based on Cramer's rule to obtain two hybrid encrypted images. Then, after the decryption step, the hidden message can be retrieved from the watermarked image without any loss. The security analysis and experimental simulations confirmed that the proposed algorithm has a good encryption performance; it can encrypt a large number of images combined with text, of different types while maintaining a reduced Mean Square Error (MSE) after decryption.

Research paper thumbnail of A Robust and Fast Image Encryption Scheme Based on a Mixing Technique

Secur. Commun. Networks, 2021

This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt ... more This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one or multiple images of different types and sizes. The mixing model follows a nonlinear mathematical expression based on Cramer’s rule. Two 1D systems already developed in the literature, namely, the May-Gompertz map and the piecewise linear chaotic map, were used in the mixing process as pseudo-random number generators for their good chaotic properties. The image to be encrypted was first of all partitioned into N subimages of the same size. The subimages underwent a block permutation using the May-Gompertz map. This was followed by a pixel-based permutation using the piecewise linear chaotic map. The result of the two previous permutations was divided into 4 subimages, which were then mixed using pseudo-random matrices generated from the two maps mentioned above. Tests carried out on the cryptosystem designed proved that it was fast due to the 1D maps used, robust in terms of noise a...

Research paper thumbnail of Secure Transmission of Medical Image for Telemedicine

These recent years have witnessed a widespread of telemedicine thanks to the development of infor... more These recent years have witnessed a widespread of telemedicine thanks to the development of information and communication technologies. Many medical information have therefore been exchanged between health practionners. A large portion of these are medical images. Most of these images contain patient private information, that must therefore be kept confidential. As a result, this paper proposes a new cryptosystem for telemedecine applications, which encrypts multiple medical images of different types using an hybrid approach. Two plain images are firstly scrambled separately with chaotic maps, and then fused to enhance the cryptosystem robustness and enlarge its key space. The first image is ciphered through the permutation and diffusion processes using Logistic-May (LM) and Henon maps respectively. The pixels of the second image are scrambled by a Logistic-Sine (LS) system. Finally, the fusion of both ciphered images is achieved by a non-linear mathematical expression based on Cram...

Research paper thumbnail of Multiple-Image Fusion Encryption (MIFE) Using Discrete Cosine Transformation (DCT) and Pseudo Random Number Generators

Multimedia Information Retrieval [Working Title]

This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of water... more This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of watermarked images and new chaotic generators. Logistic-May (LM), May-Gaussian (MG), and Gaussian-Gompertz (GG) were used as chaotic generators for their good properties in order to correct the flaws of 1D chaotic maps (Logistic, May, Gaussian, Gompertz) when used individually. Firstly, the discrete cosine transformation (DCT) and the low-pass filter of appropriate sizes are used to combine the target watermarked images in the spectral domain in two different multiplex images. Secondly, each of the two images is concatenated into blocks of small size, which are mixed by changing their position following the order generated by a chaotic sequence from the Logistic-May system (LM). Finally, the fusion of both scrambled images is achieved by a nonlinear mathematical expression based on Cramer's rule to obtain two hybrid encrypted images. Then, after the decryption step, the hidden message can be retrieved from the watermarked image without any loss. The security analysis and experimental simulations confirmed that the proposed algorithm has a good encryption performance; it can encrypt a large number of images combined with text, of different types while maintaining a reduced Mean Square Error (MSE) after decryption.

Research paper thumbnail of Multiple Image Fusion Encryption (MIFE) using Discrete Cosine Transformation (DCT) and Chaotic Generators

This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of water... more This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of watermarked images and new chaotic generators. Logistic-May (LM), May-Gaussian (MG), and Gaussian-Gompertz (GG) were used as chaotic generators for their good properties in order to correct the flaws of 1D chaotic maps (Logistic, May, Gaussian, Gompertz) when used individually. Firstly, the discrete cosine transformation (DCT) and the low-pass filter of appropriate sizes are used to combine the target watermarked images in the spectral domain in two different multiplex images. Secondly, each of the two images is concatenated into blocks of small size, which are mixed by changing their position following the order generated by a chaotic sequence from the Logistic-May system (LM). Finally, the fusion of both scrambled images is achieved by a nonlinear mathematical expression based on Cramer's rule to obtain two hybrid encrypted images. Then, after the decryption step, the hidden message can be retrieved from the watermarked image without any loss. The security analysis and experimental simulations confirmed that the proposed algorithm has a good encryption performance; it can encrypt a large number of images combined with text, of different types while maintaining a reduced Mean Square Error (MSE) after decryption.

Research paper thumbnail of A Robust and Fast Image Encryption Scheme Based on a Mixing Technique

Secur. Commun. Networks, 2021

This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt ... more This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one or multiple images of different types and sizes. The mixing model follows a nonlinear mathematical expression based on Cramer’s rule. Two 1D systems already developed in the literature, namely, the May-Gompertz map and the piecewise linear chaotic map, were used in the mixing process as pseudo-random number generators for their good chaotic properties. The image to be encrypted was first of all partitioned into N subimages of the same size. The subimages underwent a block permutation using the May-Gompertz map. This was followed by a pixel-based permutation using the piecewise linear chaotic map. The result of the two previous permutations was divided into 4 subimages, which were then mixed using pseudo-random matrices generated from the two maps mentioned above. Tests carried out on the cryptosystem designed proved that it was fast due to the 1D maps used, robust in terms of noise a...

Research paper thumbnail of Secure Transmission of Medical Image for Telemedicine

These recent years have witnessed a widespread of telemedicine thanks to the development of infor... more These recent years have witnessed a widespread of telemedicine thanks to the development of information and communication technologies. Many medical information have therefore been exchanged between health practionners. A large portion of these are medical images. Most of these images contain patient private information, that must therefore be kept confidential. As a result, this paper proposes a new cryptosystem for telemedecine applications, which encrypts multiple medical images of different types using an hybrid approach. Two plain images are firstly scrambled separately with chaotic maps, and then fused to enhance the cryptosystem robustness and enlarge its key space. The first image is ciphered through the permutation and diffusion processes using Logistic-May (LM) and Henon maps respectively. The pixels of the second image are scrambled by a Logistic-Sine (LS) system. Finally, the fusion of both ciphered images is achieved by a non-linear mathematical expression based on Cram...

Research paper thumbnail of Multiple-Image Fusion Encryption (MIFE) Using Discrete Cosine Transformation (DCT) and Pseudo Random Number Generators

Multimedia Information Retrieval [Working Title]

This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of water... more This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of watermarked images and new chaotic generators. Logistic-May (LM), May-Gaussian (MG), and Gaussian-Gompertz (GG) were used as chaotic generators for their good properties in order to correct the flaws of 1D chaotic maps (Logistic, May, Gaussian, Gompertz) when used individually. Firstly, the discrete cosine transformation (DCT) and the low-pass filter of appropriate sizes are used to combine the target watermarked images in the spectral domain in two different multiplex images. Secondly, each of the two images is concatenated into blocks of small size, which are mixed by changing their position following the order generated by a chaotic sequence from the Logistic-May system (LM). Finally, the fusion of both scrambled images is achieved by a nonlinear mathematical expression based on Cramer's rule to obtain two hybrid encrypted images. Then, after the decryption step, the hidden message can be retrieved from the watermarked image without any loss. The security analysis and experimental simulations confirmed that the proposed algorithm has a good encryption performance; it can encrypt a large number of images combined with text, of different types while maintaining a reduced Mean Square Error (MSE) after decryption.