The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multimedia data, nowadays, needs high levels of security as it is widely transferred over various networks. One of the newly-invented and most attracting safety-raising strategies is the chaos-based cryptography. This paper examines the competence of an algorithm for image encryption that uses a double-chaotic logistic map equation. The algorithm produces two sequence keys (K1 & K2) in two phases...
There has been a considerable debate on the applicability of conventional encryption techniques for protecting images. Chaos based encryption systems are preferred for digital image encryption for a long time now. For a reliable encryption method any alteration in image content or the key must be reflected in the cipher image. The present work demonstrates a highly secure and reliable encryption of...
A data encryption model based on logistic map is studied and multiple chaotic dynamical systems were implemented to improve by addressing the issues related to use of logistic map. Use of different chaotic systems other than logistic map, provides us to vary control parameters to a larger extent, hence enabling to overcome the limitations of logistic map without compromising security of data. Further,...
In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the...
Information security is crucial to data storage and transmission, which is necessary to protect information under various hostile environments. Cryptography serves as a major element to ensure confidentiality in both communication and information technology, where the encryption and decryption schemes are implemented to scramble the pure plaintext and descramble the secret ciphertext using security...
In this paper, a novel quantum encryption algorithm for color image is proposed based on multiple discrete chaotic systems. The proposed quantum image encryption algorithm utilize the quantum controlled-NOT image generated by chaotic logistic map, asymmetric tent map and logistic Chebyshev map to control the XOR operation in the encryption process. Experiment results and analysis show that the proposed...
In this paper, we propose a chaotic convolutional encryption scheme based on multiple chaos mapping. The scheme employs the characteristics of pseudo randomness and sensitivity to initial conditions of chaos mapping. It generates time-varying state transition matrix through modulo-two adder between multiple chaos sequences and input data as well as the state values of status registers in convolutional...
A novel scheme for the introduction of chaos-based security into embedded systems at an architectural (hardware) level is presented in this letter. The logistic map is simplified for use in resource-constrained microcontrollers in the encryption of digital data through interface protocols like SPI etc. This letter, as an example, presents an outline of the registers and their associated logic for...
Recently, great attention is paid to the use of chaotic maps in image encryption applications due to their excellent randomness properties. In this paper, an efficient image encryption algorithm using a set of chaotic maps has been proposed. The proposed algorithm consists of three stages: confusion, shuffling, and diffusion. In confusion stage, the original image is confused by using Arnold cat chaotic...
The digital image encryption algorithm based on chaotic system has become a hot research topic in the domain of image encryption. This paper proposes an image encryption algorithm based on improved logistic map and Block-Mod algorithm. Firstly, a chaotic sequence is generated by improved logistic map, scrambling the positions of the image pixels in the spatial-domain. Secondly, the pixel values are...
In recent years, the chaos based cryptographic algorithms have enabled some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a new approach for image encryption based on chaotic maps in order to meet the requirements of secure image encryption. The chaos based image encryption technique uses simple chaotic maps which are very sensitive to original conditions...
Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use...
Emerging communication technologies in distributed network systems require transfer of biometric digital images with high security. Network security is identified by the changes in system behavior which is either Dynamic or Deterministic. Performance computation is complex in dynamic system where cryptographic techniques are not highly suitable. Chaotic theory solves complex problems of nonlinear...
This paper proposed a new approach to improve the security of Chaos based on using triple of different Chaotic Maps, include Chen, Lorenz and Henon Maps for speech scrambling. These Chaotic Maps using to generate secret key. Also, the paper use linear and non-linear functions to calculate the secret key, thatit uses in speech scrambling process. The main goal of the use of triple Chaotic Maps is to...
Security has become vital issue in storage and transmission of digital data over insecure communication channel which can be achieved by using reliable encryption algorithms. Chaos based encryption techniques are more popular because of their exceptionally superior properties such as high security, simplicity and faster speed. In this paper, one of the chaos based text encryption algorithms is considered...
The volume of image files transmitted over internet is humongous in the present world. Secure transmission of confidential images requires critical attention with the growing demand on new techniques for protecting them. The proposed work aims at developing an image encryption solution with the mix of software and hardware. The technique adopted in this work is based on the confluence of optic system...
Image encryption is being adopted as a secure strategy to protect the confidential images across the information sharing arena. Scrambling process plays an important role in achieving better confusion during the image encryption. An image encryption scheme based on cyclic shift and chaotic system has been proposed by Wang X-Y et al, 2015 [1]. In that approach, the scrambling process based on logistic...
Internet has become widespread, and is used for all transactions to support client and server services. E-commerce is also one of the services to sell the goods using the Internet. E-Transaction has becomes more important, security for E-transaction is a important work because of the insecure communication channel. In this paper, we have proposed a new algorithm for a secure e-transaction using chaos.
This paper proposed a secure and fast image encryption algorithm which is composed of permutation and substitution of pixels. In order to eliminate the relation between adjacent pixels in the image sufficiently, firstly, the sequence which derives from Logistic map is sorted as an ascending order, and the transformation function of element's index can be obtained in this process. Secondly, perform...
Non-linear chaos is a property of equations, cauterized by non-periodicity, the high sensitivity to initial conditions and his control parameters, ability to reciprocal synchronization and unpredictability. The deterministic nature of the chaotic system can be used to generate a pseudorandom sequence for digital ciphering algorithms. This work presents a pseudo-random bit generator (PRBG), based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.