The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Transmission of images from satellite to ground is exposed to threats that can damage the confidentiality of data. The Advanced Encryption Standard (AES) is slowly emerging in modern space missions. In this paper, a modification to the AES-Counter mode is proposed to increase the level of security and to enhance the performance of image encryption. The modification is done by combining the GEFFE Generator...
Security is one of the crucial requirements of the multimedia communication which can be achieved by using encryption. Encryption algorithms based on chaos generally satisfy the basic requirements of the cryptosystem such as simplicity, high sensitivity, fast speed, high security etc. In this paper, chaos based speech encryption algorithm is proposed which employs modified Henon map and sine map....
SM4 is a 128-bit block cipher used in the WAPI (Wireless LAN Authentication and Privacy Infrastructure) standard for protecting data packets in WLAN. This paper proposes a novel method of CPA (Correlation Power Analysis) on SM4 based on chosen-plaintext. Using SM4 as target algorithm, Sakura-G FPGA board as hardware verification platform, we only collect 1000 power consumption waveforms to obtain...
Most of papers on image encryption provide some measures to attest that the presented works satisfy the required criteria in the field. Some others propose a comparative study and decide on whether one work is better than another one always using these measures. These last are of different types where the correlation coefficient is one among them. It is a statistical measure used to analyze the resemblance...
With the increasing number of applications for security in small devices and short lived transactions services, and the encryption algorithm which we need is faster, more convenient, and more secure. TEA is one of them. In this paper, there are four experiments with 64 and 128 bit size key TEA. The results of the experiments proving that TEA cannot defend Bitsum Attack. The reason is in TEA the bitsum...
Higher Order Differential Power Analysis (HO-DPA) has been introduced for more than ten years. Various combining functions are applied to attack the masked AES implementation, but finding an appropriate combining function is still a big issue. We study the weakness of absolute difference method when using multi-bit variables to mount an attack. In this paper, an optimized method is proposed to improve...
Multimedia information security has a vital role in communication systems. One of the security aspects is the encryption. A new image encryption approach, that uses the Camellia block cipher algorithm combined with the logistic chaotic map, is proposed in this paper. CAT map is used to scramble the image and the S-function output is masked for more security. Key schedule algorithm is used to generate...
Yongdae K ea al. poposed biasing power traces to improve correlation in power analysis attack in 2010. However this method abandons large numbers of power traces which is unreasonable in comparison with traditional CPA. In this paper, the traces acquirement process is divided into two stages. In the first stage, some plaintexts are chosen randomly and two most probable key byte candidates are recovered...
This paper presents a new method for image encryption using Genetic algorithm (GA). First, rows and columns of the input image are dislocated randomly. Then, the obtained image is divided into four equal sized sub-images. After selecting one of these sub-images accidentally, two pixels are chosen from it as GA initial population. Cross-over and mutation operations are applied on the binary values...
In this paper, we combined the modality of the fingerprint with that of the iris. This was done by merging the two biometric signatures by means of watermarking based on vector quantization. The proposed technique is based on the extraction of features from the fingerprint image to hide the iris code. This appeared to be the most obvious alternative, given the type of manipulated images. The robustness...
In present age chaos based cryptosystem has gained attention in research of information security and number of chaos based image encryption algorithms has been proposed. In this paper, a new symmetric image encryption algorithm based on multiple chaotic maps is proposed. In the proposed algorithm, the plain image is first scrambled using generalized Arnold Cat Map. Further, the scrambled image at...
In this paper we propose a novel image encryption scheme. The proposed method is based on the chaos theory. Our cryptosystem uses the chaos theory to define a dynamic chaotic Look-Up Table (LUT) to compute the new value of the current pixel to cipher. Applying this process on each pixel of the plain image, we generate the encrypted image. The results of different experimental tests, such as Key space...
Many methods have been put forth to perform image encryption using Chaotic Neural Networks. In this paper, another method of chaotic image encryption called the “Triple-Key” method is introduced. In this method, it is required to enter an 80-bit session key in addition to the initial parameter key and the control parameter key. Each of the keys forms just one part of the lock that needs to be opened...
In this paper, we propose an algorithm for image encryption using chaotic maps and gyrator transform. Chaotic Logistic and tent maps are used to generate the required random bit sequences. Pixels of the plain image are encrypted through gyrator transform, and then it is partitioned into 8 bit map planes. Later, the bits of each plane are substituted according to random bit matrix that is the products...
As a result of the development of computer network technology, communication of information through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. Therefore the communication security is now an important issue for multimedia communications. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.