The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As digital chaos is affected by the limited precision of computer, chaotic sequence properties present short periodicity. For the phenomenon of digital chaos, the paper analyzes similar-short periodicity of digital chaos and puts forward a novel generator of digital chaos key sequence. Meanwhile, we detail the DCT (Discrete Cosine Transformation) compression and Wavelet compression method, and then...
In this paper a new image encryption algorithm is proposed based on Qi hyper-chaotic system. Pseudo random sequences generated from Qi hyper-chaotic system are used to hide the image visual information and to change the image characteristics in the frequency and spatial domains. In this method, a two-level encryption is employed. The first level consists of a selective encryption of Discrete Cosine...
In this paper a hyper-chaotic cryptosystem is proposed based on two encryption processes: the image substitution permutation cryptography process followed by masking of the ciphered image. In the substitution-permutation cryptography process, the selective encryption using exclusive or operation is performed in the frequency domain, and the image is further encrypted in the spatial domain using the...
Recently, various image encryption algorithms have been proposed in order to images from unauthorized access and distribution, and most of them only has the operation on encryption in spatial domain, but no consideration of its corresponding compression. Therefore, to ensure the level of compression ratio and image quality, a class of JPEG image encryption algorithm based on spatiotemporal chaos is...
This paper presents a new color image encryption algorithm based on the fractional-order hyper chaotic systems. First, two fractional-order hyper chaotic systems is applied to generate the chaotic sequences to scramble and diffuse the images. The system parameters, fractional order and initial conditions can be used as the secret keys. Second, we modify the RGB values of the plain-image pixels using...
Symmetric stream cipher with chaotic maps have been proven to be feasible and secure for digital image encryption, where 2D Cat map as well as Baker map are usually employed to permute pixels and 1D chaotic maps are employed to diffuse the values of pixels. In this paper, a new permutation method with perturbation strategy is proposed, which is used to enhance the performance of Cat map and hence...
The shortage of original AES key generation and expansion strategy was researched. Based on these researches, the new AES key generation and expansion algorithms are proposed. In these algorithms, two-dimensional Logistic mapping is used to reduce the dependence between sub-keys. Experimental result shows that the security and robustness of the AES sub-keys have been strengthened.
In this paper, a new joint compression and encryption scheme based on adaptive Huffman tree using chaotic maps is proposed. Due to the intrinsic feature of adaptive Huffman coding, it permits building the code as the symbols are being transmitted and can be applied in real time applications. In proposed scheme, the adaptive Huffman tree is mutated by a key-stream generated by two chaotic maps, and...
The impulsive synchronization of spatiotemprol chaos is investigated. A proof of the existence of a certain kind of impulses for synchronization such that the error dynamics is equi-attractive in the large is established. The method of choosing impulse duration and the magnitude of the impulses is discussed in detail. Moreover, as an application, a secure communication scheme based on the results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.