The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The digital image encryption algorithm based on chaotic system has become a hot research topic in the domain of image encryption. This paper proposes an image encryption algorithm based on improved logistic map and Block-Mod algorithm. Firstly, a chaotic sequence is generated by improved logistic map, scrambling the positions of the image pixels in the spatial-domain. Secondly, the pixel values are...
Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use...
The volume of image files transmitted over internet is humongous in the present world. Secure transmission of confidential images requires critical attention with the growing demand on new techniques for protecting them. The proposed work aims at developing an image encryption solution with the mix of software and hardware. The technique adopted in this work is based on the confluence of optic system...
Image encryption is being adopted as a secure strategy to protect the confidential images across the information sharing arena. Scrambling process plays an important role in achieving better confusion during the image encryption. An image encryption scheme based on cyclic shift and chaotic system has been proposed by Wang X-Y et al, 2015 [1]. In that approach, the scrambling process based on logistic...
Internet has become widespread, and is used for all transactions to support client and server services. E-commerce is also one of the services to sell the goods using the Internet. E-Transaction has becomes more important, security for E-transaction is a important work because of the insecure communication channel. In this paper, we have proposed a new algorithm for a secure e-transaction using chaos.
Signals generated by chaotic systems represent a potentially rich class of signals. These signals are used for detecting and characterizing physical phenomena and in deriving a new classes of signals for communications, remote sensing, and a variety of other signal processing applications. Various chaotic maps like Logistic map, Improved logistic map, Quadratic map etc are used to generate such signals...
Non-linear chaos is a property of equations, cauterized by non-periodicity, the high sensitivity to initial conditions and his control parameters, ability to reciprocal synchronization and unpredictability. The deterministic nature of the chaotic system can be used to generate a pseudorandom sequence for digital ciphering algorithms. This work presents a pseudo-random bit generator (PRBG), based on...
This paper suggests a new fast chaos-based image cipher with a permutation-diffusion structure. In the permutation stage, the original image is scrambled by swapping each pixel with another one at a location chosen by a pseudorandom permutation generated from the logistic map. The initial condition of the map, i.e. the permutation key, is determined by the CityHash value of the original image. Owing...
In this paper we propose a fast and secure encryption system with a mixed-architecture based on a Modified Logistic Map and a Linear Feedback Shift Register. The system has been simulated showing that it can encrypt and decrypt images efficiently. The encrypted messages have been able to pass the NIST as well as the diehard battery of tests proving that the system is secure.
In this paper Binary phase coded sequences are generated using various chaotic maps like logistic map, improved logistic map, henon map, quadratic map, etc. The theory of generation of bi-phase sequences will be explained. Comparison will be made in terms of merit factor and autocorrelation value. The best sequence is that which has produced high value of Merit factor. All simulations are carried...
In this paper, an image encryption scheme based on colour byte scrambling technique is proposed by using Logistic map and Ikeda map. The proposed scheme is using Logistic map for generating permutation sequence to shuffle the colour bytes (confusion) and Ikeda map is used for generating masking sequence to change the value of the colour bytes (diffusion) of the 24-bit colour image. The traditional...
This paper presents a generalized form of the fractional logistic map. Two general parameters a and b are added to the classical fractional logistic equation. The effect of such parameters on the map is studied explicitly, in combination with the fractional order parameter α, which offers an extra degree of freedom increasing the design flexibility and adding more controllability on the design. The...
Chaos-based cryptography is a promising and emerging field that offers a large variety of techniques particularly suitable for applications such as image encryption. The fundamental characteristics of chaotic systems are closely related to the properties of a strong cryptosystem. Most research on chaos-based encryption does not concentrate on the aspect of encryption modes of operation. This paper...
A new image encryption algorithm based on logistic map and hyper-chaos is proposed in this paper. The logistic chaotic sequences are modified to generate the chaotic key 1 which have a better randomness. A hyperchaos system is employed to produce the chaotic key 2. Encryption algorithm includes two rounds of image encryption based on double kinds of keys. The Ciphertext diffusion mechanism is produced...
In this paper, an analysis study of two encryption algorithms applied to images is performed in order to assess their robustness in terms of security. The first is the classical cryptosystem known as Advanced Encryption Standard (AES) and the second is issued from the study of chaotic signals called the logistic map. The experimental results and their analysis show that AES encryptions is more secure,...
An improved image encryption algorithm based on chaotic logistic map is designed. First, after two initial values of Logistic chaotic map are pretreated, two of the modified initial values are obtained, according to which two chaotic sequences are generated. Next, two chaotic sequences are operated by cos-1 function. Last, image is encrypted combining the method of the gray value substituting. Results...
In this paper, iteration method of logistic map with low positions is introduced in order to investigate property of logistic map. Basic structure of logistic map is proposed, which consists of common gene positions (CGPs) and individual gene positions (IGPs). CGPs have the same value of corresponding positions which transferred from previous numerical solutions. The ergodicity and long-term unpredictability...
Chaotic theory has been applied to image encryption as an effective and robust technique due to its unique properties. In this paper, we introduce a new combined chaotic system, which shows better chaotic behaviors than the traditional ones. Applying this chaotic system to image processing, a new image encryption algorithm is introduced based on the confusion and diffusion in encryption procedure...
We present recent results of our studies on the FPGA implementation of pseudo-random bit generators (PRBGs) based on a chaotic behavior of nonlinear systems. A number of different PRBG architectures have been considered, including logistic mapping, Hénon mapping, and frequency dependent negative resistor (FDNR). All versions of PRBGs have been implemented in five FPGA families of devices from Xilinx...
Due to extensive research of non-linear science theory (the chaos) in the image encryption, we find especially that the properties of chaos make itself particularly suitable for image encryption. On the basis of many excellent features of chaotic sequence, combining application of chaotic theory in cryptography, the paper puts forward image encryption based on chaotic binary sequence. On Logistic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.