The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A data encryption model based on logistic map is studied and multiple chaotic dynamical systems were implemented to improve by addressing the issues related to use of logistic map. Use of different chaotic systems other than logistic map, provides us to vary control parameters to a larger extent, hence enabling to overcome the limitations of logistic map without compromising security of data. Further,...
In the current era because of the advanced techniques in digital communication network, telemedicine is used to diagnose diseases in remote areas. Hence the broadcast of electronic medical images over internet has become frequent. Due to lack of security levels in internet broadcast of electronic medical image is always susceptible to hackers and other breaches of security. Ensuring the security,...
Security is one of the core areas of study of the IT industry. In this era, where our information represents us, information security is no more a simple non-functional requirement. In order to define and determine security trends and techniques with respect to evolving data that impacts our life every day, Here in this paper we define and design procedures and schemes that provides privacy, security...
As multimedia applications are used increasingly, security becomes an important issue of security of images. The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed...
Synchronization of chaotic system is used in secure communication because of the random type behavior of chaotic systems. But there is no absolute safe communication system. A new kind of decryption method is proposed in this paper by making use of the robustness of synchronization strategy. Also model with sender, receiver and unfriendly receiver is built and a decryption problem is transformed to...
Nowadays many image cryptosystems have been shown to be insecure. In this paper we present a new cryptosystem based on the chaotic time delay feedback Chua circuit. It consists of two steps: the first step assures the transmitter/receiver synchronization while the second step focuses on the encryption/decryption procedure. The synchronization is performed through a nonlinear state observer design,...
This paper presents a image encryption algorithm based on Arnold transformation and chaotic mapping. Firstly, Arnold transformation is used to scramble image. Then we use Tent mapping to encrypt scrambled image. The result shows that the algorithm is easy to realize, providing high security.
In this paper, we have implemented a secure communication platform based on a new stream cipher called Gemstone which stems from coupled map lattices (CML), a nonlinear system of coupled chaotic maps. On the platform, we have realized duplex text, image and voice transmission. We have also analyzed the randomness of the keystream generated by the platform based on the statistical tests suggested by...
A new encryption scheme for digital images based on compound Chaos algorithm is presented in this paper. The compound Chaos algorithm combines the Lorenz Chaotic system and Logistics map to generate the pseudo-random sequences. Then the pseudo-random sequences are used to produce the permutation matrix to encrypt the digital image. Matlab is used for simulation testing of the image encryption. Algorithm...
In this paper, the problem of chaotic secure communication is addressed from an iterative learning perspective, where the plaintext spans over a pre-specified finite-time interval. In the cryptographic scheme, the plaintext is modulated through chaotic parameter modulation, and then chaotically masked by a nonlinear mechanism. An efficient learning algorithm is exploited for decryption, and the sufficient...
In the past decade, a number of image encryption algorithms based on chaotic maps have been proposed. Recently, an image encryption algorithm based on chaotic map lattice (CML) is proposed that allows direct encryption and decryption of color digital images. In this paper, we propose an enhanced CML based algorithm for image encryption to improve the security of the algorithm. The performance of the...
According to the characteristics of discrete chaotic sequences and basic encrypting principles of information, and organically combining some inherent characteristics of digital images, with a view of high efficiency and perfect effect for encryption and decryption of digital images, meanwhile, and considering the high security of the encrypting algorithm, a discrete chaotic encrypting algorithm of...
This paper proposes an ASIC implementation of a chaos-based image encryption algorithm, which features dual-RAM connection and reusable data-path for each round of encryption and decryption. Within a pixel block, general cat-map and logistic map are alternately used for permutation, diffusion and substitution. The algorithm is robust to many forms of attacks, and the proposed hardware structure bears...
Against the existing security issues in WLAN, a modified hyper-chaotic sequence encryption algorithm for the security of WLAN was given.It proved to be effective to resistance the attack of exhaustive method; sub-Nyquist sampling interval was used to increase the key space and had proved that made the arithmetic has anti nonlinear reorganization attack capability; realized the algorithmpsilas encryption...
Chaos has attracted much attention in the field of cryptography. It describes a system which is sensitive to initial condition. It generates apparently random behaviour but at the same time is completely deterministic. The proposed schemes make use of the chaotic system implemented at the transmitter receiver end using two different cryptographic algorithms. The encryption could be done by adding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.