Optimized Two-Dimensional Chaotic Mapping for Enhanced Image Security Using Sea Lion Algorithm

2021 ◽  
pp. 981-998
Author(s):  
H. R. Latha ◽  
A. Ramaprasath

Protection of digital data is the utmost requirement of the day. Everything in the world is being upgraded to electronic communication and which requires protection against data fraud. Data is nowadays not only text but image, audio video individually and sometimes together as multimedia files. Encryption algorithms protect data against attacks and hackers. This paper proposes a new Sealion Optimization algorithm for enhanced image security, analyses several recent developments in encryption and decryption algorithms and summarizes different approaches, their benefits and limitations.


2010 ◽  
Vol 20-23 ◽  
pp. 670-675
Author(s):  
You Xin Luo ◽  
Bin Zeng

Many questions in natural science and engineering are transformed into nonlinear equations to be found. Newton iterative method is an important technique to one dimensional and multidimensional variables and iterative process exhibits sensitive dependence on initial guess point. The probability characteristic of hyper-chaotic sequences produced by two dimensional hyper-chaotic discrete systems was analyzed. For the first time, a new method to find all solutions based on utilizing two dimensional probability hyper-chaotic discrete mapping to obtain initial points to find all solutions of the nonlinear questions was proposed. The numerical examples in linkage synthesis and approximate synthesis show that the method is correct and effective.


Author(s):  
Priti Lale, Et. al.

An information system is very important in today's changing world, and therefore choosing the proper system is becoming a very important decision. With the time, the information systems have become more crucial, with multiple problems affecting the supply chain and the continuous writing of performance areas. The principle of chain management aims at chain values. The working of chain management states that chain management enhances the value of the chain by establishing operational units. Traditional manufacturing supply chains bear a lot from additional, costs, delays and information loss due to information middleware’s. Therefore, we propose a blockchain oriented supply chain architecture to reduce intrusion in traditional ones. Current approaches to private-key security include signature schemes based on bio-metrics, index-hidden private key design, and post-quantum block chain schemes. Nevertheless, recovering the lost private key is difficult in all approaches. Here we proposed an optimal key formation procedure using a fitness-based self-adaptive sea lion algorithm for secure information sharing in SCM using block chain.


2015 ◽  
Vol 12 (2) ◽  
pp. 823-841 ◽  
Author(s):  
Wei Liang ◽  
Keshou Wu ◽  
Yong Xie ◽  
Jiajun Duan

With the rapid development of VLSI (Very Large Scale Integration) circuit, IP (Intellectual Property) protection for reused technology is widely concerned. A watermarking scheme for IP protection is proposed on basis of a two dimensional chaotic mapping model (TDCM). The scheme utilizes a secure and controllable embedding model to compute the aggregation level of physical resource positions and the secure threshold of controllability. A two dimensional chaotic sequence is generated with the control of secure threshold. The first dimensional sequence is used to determine random watermark positions and the second dimensional sequence is to control watermark number in each position. Finally, the watermarks are inserted into corresponding places orderly. The experiments show that the proposed scheme has low resource overhead by comparing with other schemes. The resistance to attacks and robustness of the watermark are encouraging as well.


2021 ◽  
Vol 2066 (1) ◽  
pp. 012011
Author(s):  
Xianglian Xue ◽  
Haiyan Jin

Abstract This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based on this, a novel image security protection method based on DCT compression theory and hyper-chaotic mapping is proposed. First, the position of the pixel of the original image is disturbed, and converts the image from spatial domain into frequency domain by the two-dimensional DCT transformation and quantization. Second, change the pixel values by modifying the values of the sign bit of AC coefficient and DC coefficient. At last, the encrypted image is obtained by carrying out inverse quantization, inverse transformation and reverse operation by bit.


2011 ◽  
Vol 230-232 ◽  
pp. 764-768
Author(s):  
You Xin Luo ◽  
Bin Zeng

Mechanism synthesis questions can be transformed into nonlinear equations to be found. Interval Newton iterative method is an important technique to one dimensional and multidimensional variables and iterative process exhibits sensitive dependence on initial guess point. The characteristic of hyper-chaotic sequences produced by two dimensional hyper-chaotic discrete systems was analyzed. Making use of the advantage of giving rigorous bounds for the exact solution, for the first time, combining hyper-chaos sequences and interval Newton iteration with Krawczyk operator, a new method to find all solutions was proposed. The numerical examples in linkage synthesis and approximate synthesis show that the method is correct and effective.


1966 ◽  
Vol 24 ◽  
pp. 118-119
Author(s):  
Th. Schmidt-Kaler

I should like to give you a very condensed progress report on some spectrophotometric measurements of objective-prism spectra made in collaboration with H. Leicher at Bonn. The procedure used is almost completely automatic. The measurements are made with the help of a semi-automatic fully digitized registering microphotometer constructed by Hög-Hamburg. The reductions are carried out with the aid of a number of interconnected programmes written for the computer IBM 7090, beginning with the output of the photometer in the form of punched cards and ending with the printing-out of the final two-dimensional classifications.


1966 ◽  
Vol 24 ◽  
pp. 3-5
Author(s):  
W. W. Morgan

1. The definition of “normal” stars in spectral classification changes with time; at the time of the publication of theYerkes Spectral Atlasthe term “normal” was applied to stars whose spectra could be fitted smoothly into a two-dimensional array. Thus, at that time, weak-lined spectra (RR Lyrae and HD 140283) would have been considered peculiar. At the present time we would tend to classify such spectra as “normal”—in a more complicated classification scheme which would have a parameter varying with metallic-line intensity within a specific spectral subdivision.


Sign in / Sign up

Export Citation Format

Share Document