The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A data encryption model based on logistic map is studied and multiple chaotic dynamical systems were implemented to improve by addressing the issues related to use of logistic map. Use of different chaotic systems other than logistic map, provides us to vary control parameters to a larger extent, hence enabling to overcome the limitations of logistic map without compromising security of data. Further,...
In this paper, we propose a chaotic convolutional encryption scheme based on multiple chaos mapping. The scheme employs the characteristics of pseudo randomness and sensitivity to initial conditions of chaos mapping. It generates time-varying state transition matrix through modulo-two adder between multiple chaos sequences and input data as well as the state values of status registers in convolutional...
Recently, great attention is paid to the use of chaotic maps in image encryption applications due to their excellent randomness properties. In this paper, an efficient image encryption algorithm using a set of chaotic maps has been proposed. The proposed algorithm consists of three stages: confusion, shuffling, and diffusion. In confusion stage, the original image is confused by using Arnold cat chaotic...
The digital image encryption algorithm based on chaotic system has become a hot research topic in the domain of image encryption. This paper proposes an image encryption algorithm based on improved logistic map and Block-Mod algorithm. Firstly, a chaotic sequence is generated by improved logistic map, scrambling the positions of the image pixels in the spatial-domain. Secondly, the pixel values are...
In recent years, the chaos based cryptographic algorithms have enabled some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a new approach for image encryption based on chaotic maps in order to meet the requirements of secure image encryption. The chaos based image encryption technique uses simple chaotic maps which are very sensitive to original conditions...
Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use...
Emerging communication technologies in distributed network systems require transfer of biometric digital images with high security. Network security is identified by the changes in system behavior which is either Dynamic or Deterministic. Performance computation is complex in dynamic system where cryptographic techniques are not highly suitable. Chaotic theory solves complex problems of nonlinear...
Security has become vital issue in storage and transmission of digital data over insecure communication channel which can be achieved by using reliable encryption algorithms. Chaos based encryption techniques are more popular because of their exceptionally superior properties such as high security, simplicity and faster speed. In this paper, one of the chaos based text encryption algorithms is considered...
The volume of image files transmitted over internet is humongous in the present world. Secure transmission of confidential images requires critical attention with the growing demand on new techniques for protecting them. The proposed work aims at developing an image encryption solution with the mix of software and hardware. The technique adopted in this work is based on the confluence of optic system...
Image encryption is being adopted as a secure strategy to protect the confidential images across the information sharing arena. Scrambling process plays an important role in achieving better confusion during the image encryption. An image encryption scheme based on cyclic shift and chaotic system has been proposed by Wang X-Y et al, 2015 [1]. In that approach, the scrambling process based on logistic...
Internet has become widespread, and is used for all transactions to support client and server services. E-commerce is also one of the services to sell the goods using the Internet. E-Transaction has becomes more important, security for E-transaction is a important work because of the insecure communication channel. In this paper, we have proposed a new algorithm for a secure e-transaction using chaos.
Non-linear chaos is a property of equations, cauterized by non-periodicity, the high sensitivity to initial conditions and his control parameters, ability to reciprocal synchronization and unpredictability. The deterministic nature of the chaotic system can be used to generate a pseudorandom sequence for digital ciphering algorithms. This work presents a pseudo-random bit generator (PRBG), based on...
This paper suggests a new fast chaos-based image cipher with a permutation-diffusion structure. In the permutation stage, the original image is scrambled by swapping each pixel with another one at a location chosen by a pseudorandom permutation generated from the logistic map. The initial condition of the map, i.e. the permutation key, is determined by the CityHash value of the original image. Owing...
Due to great progress in wireless communication and the existence of public channel, through which the information transferred among users, the problem related to information security increased, especially the eavesdropping and attacking of these information. These facts required the increase of the security levels of the used cryptosystems techniques in order to prevent the attacking of transmitted...
In this paper we propose a fast and secure encryption system with a mixed-architecture based on a Modified Logistic Map and a Linear Feedback Shift Register. The system has been simulated showing that it can encrypt and decrypt images efficiently. The encrypted messages have been able to pass the NIST as well as the diehard battery of tests proving that the system is secure.
In this paper, an image encryption scheme based on colour byte scrambling technique is proposed by using Logistic map and Ikeda map. The proposed scheme is using Logistic map for generating permutation sequence to shuffle the colour bytes (confusion) and Ikeda map is used for generating masking sequence to change the value of the colour bytes (diffusion) of the 24-bit colour image. The traditional...
The use of chaos for image encryption over traditional text based encryption methods has gained momentum due to its superior performance. In this paper, a fast encryption method is presented which utilizes a substitution-permutation network using two chaotic maps. Logistic maps are used to create substitution box while key dependent rectangular chaotic maps is used for permutation of pixels. The algorithm...
Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based cryptosystems have been proposed for achieving the confidentiality of transmitted images over public channels. Most of chaos-based encryption algorithms are based on the Fridrich structure,...
For the past few decades, an explosion of interest is being shown in the sharing of digital data over internet. The data which are transmitted over such network environments are often subjected to eavesdropping and malicious interventions. Steganography can be defined as the practice of undetectably altering a work to embed a secret message. People are more interested in sending secret information...
This paper presents a generalized form of the fractional logistic map. Two general parameters a and b are added to the classical fractional logistic equation. The effect of such parameters on the map is studied explicitly, in combination with the fractional order parameter α, which offers an extra degree of freedom increasing the design flexibility and adding more controllability on the design. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.