Random selective block encryption technique for image cryptography using chaotic cryptography

Author(s):  
S. Anupadma ◽  
B.S. Dharshini ◽  
S. Roshini ◽  
John Singh K.
2011 ◽  
Vol 25 (29) ◽  
pp. 3987-3996
Author(s):  
XING-YUAN WANG ◽  
XIAO-JUAN WANG

This paper proposes a new block encryption algorithm. The chaotic trajectories are computed by weighting. Then the result is used to mask the plaintext. Multiple blocks of plaintext are encrypted at the same time and this decreases the chaotic iterations. So the encryption speed is improved to some extent. The proposed algorithm is flexible. When the number of weights is increased, the number of the encrypted plaintext block at the same time is increased and the encryption speed is improved. The simulation result shows that the proposed algorithm has fast encryption speed and fine security.


Author(s):  
Amine Rahmani

Chaotic cryptography has been a well-studied domain over the last few years. Many works have been done, and the researchers are still getting benefit from this incredible mathematical concept. This paper proposes a new model for coloured image encryption using simple but efficient chaotic equations. The proposed model consists of a symmetric encryption scheme in which it uses the logistic equation to generate secrete keys then an affine recursive transformation to encrypt pixels' values. The experimentations show good results, and theoretic discussion proves the efficiency of the proposed model.


2019 ◽  
Vol 10 (2) ◽  
pp. 181-191
Author(s):  
Vladimir Mikhailovich Fomichev ◽  
Alisa Mikhailovna Koreneva ◽  
Al'finur Ruslanovna Miftakhutdinova ◽  
Dmitrii Igorevich Zadorozhny

Исследуется класс нелинейных итеративных преобразований, обобщающих сеть Фейстеля и построенных на основе автономного регистра сдвига длины $n$ с $m$ обратными связями над множеством $32$-мерных двоичных векторов, $32 \geqslant n > m \geqslant 1$. Предложена интегральная характеристика предельной производительности шифрования, которая может применяться при обосновании выбора параметров конкретных блочных алгоритмов.


2021 ◽  
pp. 240-248
Author(s):  
Mahmood Khalel Ibrahem ◽  
Hussein Ali Kassim

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time random key used to encrypt each voice data in the RTP packet. Chaotic maps have been used successfully for encryption bulky data such as voice, image, and video, chaotic cryptography has good properties such as long periodicity, pseudo-randomness, and sensitivity to initial conditions and change in system parameters. A VoIP system was successfully implemented based on the on ITU-T G.729 for voice codec, as a multimedia encoding of Real-time Transport Protocol payload data, then, apply a proposed method to generate three-mixed logistic chaotic maps [1] and then analysis the encryption/ decryption quality measures for speech signal based this method. The experimental work demonstrates that the proposed scheme can provide confidentiality to voice data with voice over IP performance quality, minimum lost in transmitted packet, minimum average delay, and minimum jitter.


2020 ◽  
Vol 9 (2) ◽  
pp. 1208-1212

Presently advanced India notoriety, associations are proposing various structures concentrating on computerized encoding procedures. Because of the simplicity of replicating, altering, and altering of computerized archives and pictures has prompted encoding the data required for transmission and capacity. It clear that the connection between's the picture pixels to its neighborhood district is high, decreasing relationship between's the pixels esteem makes it hard to figure for the first picture and along these lines enhance the security. This paper presents a novel picture encoding strategy which at first improves the picture based on exchanging dim codes and pixel blast. The pixel blast utilizes very much characterized key that switches between the dim code of the picture pixels. Exploratory outcomes would demonstrate that the proposed pixel blast is sufficient for fractional encoding and upgrades security of the information. Further, it could likewise bolster as a deadly implement for any current calculation.


IJARCCE ◽  
2018 ◽  
Vol 7 (9) ◽  
pp. 59-65
Author(s):  
Amandeep Kaur ◽  
Gurjeet Singh
Keyword(s):  

Author(s):  
Jun Peng ◽  
Du Zhang ◽  
Xiaofeng Liao

This paper proposes a novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system. The algorithm works on 32-bit image blocks with a 192-bit secret key. The idea is that the key is employed to drive the Chen’s system to generate a chaotic sequence that is inputted to a specially designed function G, in which we use new 8x8 S-boxes generated by chaotic maps (Tang, 2005). In order to improve the robustness against differental cryptanalysis and produce desirable avalanche effect, the function G is iteratively performed several times and its last outputs serve as the keystreams to encrypt the original image block. The design of the encryption algorithm is described along with security analyses. The results from key space analysis, differential attack analysis, and information entropy analysis, correlation analysis of two adjacent pixels prove that the proposed algorithm can resist cryptanalytic, statistical and brute force attacks, and achieve a higher level of security. The algorithm can be employed to realize the security cryptosystems over the Internet.


Sign in / Sign up

Export Citation Format

Share Document