Self-Parameterized Chaotic Map: A Hardware-efficient Scheme Providing Wide Chaotic Range

Author(s):  
Partha Sarathi Paul ◽  
Anurag Dhungel ◽  
Maisha Sadia ◽  
Md Razuan Hossain ◽  
Barry Muldrey ◽  
...  
Keyword(s):  
2018 ◽  
Vol 29 (07) ◽  
pp. 1850058 ◽  
Author(s):  
Nabil Ben Slimane ◽  
Nahed Aouf ◽  
Kais Bouallegue ◽  
Mohsen Machhout

In this paper, an efficient scheme for image encryption based on the nested chaotic map and deoxyribonucleic acid (DNA) is introduced. In order to generate the initial condition values of the nested chaotic system, the Secure Hash Algorithm SHA-256 is used. The algorithm consists of two main layers: confusion and diffusion. In the first layer, the nested chaotic map is employed to create the scrambled image. The scrambled image is obtained through the ascending sorting of the first component of the nested chaotic index sequence. To ensure higher sensitivity, higher complexity and higher security, DNA sequence and DNA operator are employed additionally with the nested chaotic map and hash algorithm to modify the pixel values. The important advantages of our algorithm are the improvement of Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI) and entropy, which improve resistivity against several attacks. Experimental results and relevant security analysis demonstrated that our proposed encryption scheme has the highest security level because it is more complicated, and it has a sufficiently large key space. The proposed method is compared to other recent image encryption schemes using different security analysis factors, including NPCR, UACI, correlation coefficients (CCs), encryption quality (EQ) and entropy. It is also resistant to noise (Salt and Pepper, Gaussian and speckle) and data loss attacks. The illustrated results demonstrated that the proposed image encryption scheme is efficient, and can be adopted for image encryption and transmission.


2013 ◽  
Vol 73 (3) ◽  
pp. 1469-1474 ◽  
Author(s):  
Sajjad Shaukat Jamal ◽  
Tariq Shah ◽  
Iqtadar Hussain

2014 ◽  
Vol 2014 (1) ◽  
pp. 34-42 ◽  
Author(s):  
N. S. Raghava ◽  
◽  
Ashish Kumar ◽  
Aishwarya Deep ◽  
Abhilasha Chahal ◽  
...  

Author(s):  
Rinkle Chhabra ◽  
Anuradha Saini

Mobile Ad Hoc Networks (MANET) are autonomous, infrastructure less and self-configuring networks. MANETs has gained lots of popularity due to on the fly deployment i.e. small network setup time and ability to provide communication in obstreperous terrains. Major challenges in MANETs include routing, energy efficiency, network topology control, security etc. Primary focus in this article is to provide method and algorithm to ensure significant energy savings using re-configurable directional antennas. Significant energy gains can be clinched using directional antenna. Key challenges while using directional antenna are to find destination location, antenna focusing, signal power and distance calculations. Re-configurable directional antenna can ensure significant energy gains if used intelligently. This article provides a brief insight into improved energy savings using re-configurable directional antennas and an associated algorithm


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


Author(s):  
Siyamol Chirakkarottu ◽  
Sheena Mathew

Background: Medical imaging encloses different imaging techniques and processes to image the human body for medical diagnostic and treatment purposes. Hence it plays an important role to improve public health. The technological development in biomedical imaging specifically in X-ray, Computed Tomography (CT), nuclear ultrasound including Positron Emission Tomography (PET), optical and Magnetic Resonance Imaging (MRI) can provide valuable information unique to a person. Objective: In health care applications, the images are needed to be exchanged mostly over wireless medium. The diagnostic images with confidential information of a patient need to be protected from unauthorized access during transmission. In this paper, a novel encryption method is proposed to improve the security and integrity of medical images. Methods: Chaotic map along with DNA cryptography is used for encryption. The proposed method describes a two phase encryption of medical images. Results: Performance of the proposed method is also tested by various analysis metrics. Robustness of the method against different noises and attacks is analyzed. Conclusion: The results show that the method is efficient and well suitable to medical images.


2020 ◽  
Vol 14 (12) ◽  
pp. 1724-1724
Author(s):  
Dheerendra Mishra ◽  
Vinod Kumar ◽  
Dharminder Dhaminder ◽  
Saurabh Rana

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 118624-118639
Author(s):  
Chia-Hung Lin ◽  
Jian-Xing Wu ◽  
Pi-Yun Chen ◽  
Hsiang-Yueh Lai ◽  
Chien-Ming Li ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document