You have requested a machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Neither SPIE nor the owners and publishers of the content make, and they explicitly disclaim, any express or implied representations or warranties of any kind, including, without limitation, representations and warranties as to the functionality of the translation feature or the accuracy or completeness of the translations.
Translations are not retained in our system. Your use of this feature and the translations is subject to all use restrictions contained in the Terms and Conditions of Use of the SPIE website.
16 December 1999Truncated Baker transformation and its extension to image encryption
This paper presents a new truncated Baker transformation with a finite precision and extends it to an efficient image encryption scheme. The truncated Baker transformation uses the quantization error as a secret key, which is always produced by contraction mechanism in the mapping process. The original dynamics by Baker transformation is globally preserved but a random level rotation operator is incorporated between two neighbor elements in the mapping domain in order to keep the same precision. Such perturbations are local and small in each mapping, however, as the mapping process goes on they will gradually accumulate and affect the whole dynamics. Consequently, generated binary sequences (the dynamics of elements) have statistically good features on ergodicity, mixing and chaotic properties. The extended image encryption scheme efficiently shuffle the input gray level image making difficult for a third party to decode the ciphered data to the original image without knowing the proper secret key.
The alert did not successfully save. Please try again later.
Masaki Miyamoto, Kiyoshi Tanaka, Tatsuo Sugimura, "Truncated Baker transformation and its extension to image encryption," Proc. SPIE 3814, Mathematics of Data/Image Coding, Compression, and Encryption II, (16 December 1999); https://doi.org/10.1117/12.372751