scholarly journals A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Wei Feng ◽  
Jing Zhang ◽  
Zhentao Qin

The application of multimedia sensors is widespread, and people need to transmit images more securely and efficiently. In this paper, an image transmission scheme based on two chaotic maps is proposed. The proposed scheme consists of two parts, secure image transmission between sensor nodes and sink nodes (SIT-SS) and secure image transmission between sensor nodes and receivers (SIT-SR). For resource-constrained environments, SIT-SS utilizes Tent-Logistic Map (TLM) to generate chaotic sequences and adopts TLM-Driven permutation and transformation to confuse image pixels. Then the cipher image is obtained through TLM-Driven two-dimensional compressed sensing. Compared with existing schemes, the secret key design of SIT-SS is more reasonable and requires fewer hardware resources. When sampling ratio is greater than 0.6, its image reconstruction quality has obvious advantages. For environments with huge security threats, SIT-SR adopts dynamic permutation and confusion based on discrete logarithms to confuse the image and exploits dynamic diffusion based on discrete logarithms to generate final cipher image. Similarly, compared with some existing schemes, the design of SIT-SR is more practical, and the statistical characteristics of the cipher image are better. Finally, extensive simulation tests confirm the superiority of the proposed scheme.

2019 ◽  
Vol 16 (1(Suppl.)) ◽  
pp. 0270
Author(s):  
Al-Bahrani Et al.

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,             While using chaotic maps, in the suggested system, called Chaotic-based Proposed Feistel Cipher System (CPFCS), we made the confusion and diffusion in dynamical behavior based on Standard and Lorenz maps. The first is used for substitution, and the second one for permutation operations .A proposed cryptographic system uses the same work (the same way) for both enciphering and deciphering. The proposed cipher operates on more than 500 bytes (4000-bit) readable text blocks by six round computing. Within the basic operator of the cipher, i.e., in the function of the round F, a dynamical lookup table 2D standard map system is used to enhance the complexity and diffusion of the unreadable text. Also, a 3D Logistic map used for key sequence generator and chaos based dynamical Initial Permutation (dynamical IP) are used to increase the diffusion and confusion. Three different image sizes and three different text length were implemented in CPFCS.  The results of the proposed system and security tests improve the applicability of PFCS in the data protection and security.


2018 ◽  
Vol 1 (4) ◽  
pp. 40
Author(s):  
Zhengmao Ye ◽  
Hang Yin ◽  
Yongmao Ye

This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-chaotic dynamical system. Chaotic watermarking was conducted in the spatial domain, where suboptimal secure hashing with a variable length was selected in preprocessing stages. The secret key was generated by the chaotic sequence for pixel shuffling using a chaotic logistic map, so that a controlled amount of distortion was inserted into the host digital image. Watermarking was proceeded after the chaotic watermark had been embedded into the shuffled image. To strengthen the security, the hyper-chaotic system was used to generate chaotic blocks for block scrambling in order to achieve dual chaotic watermarking. Characteristics analysis was conducted for multiple examples in both spatial and frequency domains. Potential effects induced by the chaotic driving parameter on processing time and integrity authentication of chaotic dual watermarking were also analyzed in detail.


2019 ◽  
Vol 16 (1) ◽  
pp. 0270
Author(s):  
Al-Bahrani Et al.

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,             While using chaotic maps, in the suggested system, called Chaotic-based Proposed Feistel Cipher System (CPFCS), we made the confusion and diffusion in dynamical behavior based on Standard and Lorenz maps. The first is used for substitution, and the second one for permutation operations .A proposed cryptographic system uses the same work (the same way) for both enciphering and deciphering. The proposed cipher operates on more than 500 bytes (4000-bit) readable text blocks by six round computing. Within the basic operator of the cipher, i.e., in the function of the round F, a dynamical lookup table 2D standard map system is used to enhance the complexity and diffusion of the unreadable text. Also, a 3D Logistic map used for key sequence generator and chaos based dynamical Initial Permutation (dynamical IP) are used to increase the diffusion and confusion. Three different image sizes and three different text length were implemented in CPFCS.  The results of the proposed system and security tests improve the applicability of PFCS in the data protection and security.


Author(s):  
G.Aparna Et.al

In the proposed paper an approach for image transmission with security and also improvement of the gray-scale (8-bit image) image flexible stenographic system using LSB approach. In this process a secret key of 80 bits is applied while embedding the message into the cover image. To provide high security and also confidentiality of the data a key stego-key is applied. The proposed method the information bits are embedded adaptively into the cover-image pixels. With this method a high embedding capacity in terms of hiding the data is provided and also better imperceptibility is also achieved. The major advantage of this method verifies by the Security method of Digital Signature. It is to be verified whether the attacker has made  a trials to change the Secret information in the  present inside the stego-image which is intended to be kept secret throughout the communication process. In this technique the embedding process to hide the message data present in the transformed spatial domain of the cover image and makes use of a simple Exclusive-OR  operation based on  Security checking method of  verifying the signature digitally by using key size value of 140 bits is used to check the integrity from the stego-image. The confidential data which is embedded can be retrieved from stego-images. The security level is enhanced by using the stego key and by adaptive steganography data inconspicuousness is improved.


Author(s):  
Ouerdia Megherbi ◽  
Sarah Kassim ◽  
Hamid Hamiche ◽  
Saïd Djennoune ◽  
Maamar Bettayeb ◽  
...  

2005 ◽  
Vol 1 (3-4) ◽  
pp. 345-354 ◽  
Author(s):  
Dibyendu Chakrabarti ◽  
Subhamoy Maitra ◽  
Bimal Roy

Key pre-distribution is an important area of research in Distributed Sensor Networks (DSN). Two sensor nodes are considered connected for secure communication if they share one or more common secret key(s). It is important to analyse the largest subset of nodes in a DSN where each node is connected to every other node in that subset (i.e., the largest clique). This parameter (largest clique size) is important in terms of resiliency and capability towards efficient distributed computing in a DSN. In this paper, we concentrate on the schemes where the key pre-distribution strategies are based on transversal design and study the largest clique sizes. We show that merging of blocks to construct a node provides larger clique sizes than considering a block itself as a node in a transversal design.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1313
Author(s):  
Wenhao Yan ◽  
Qun Ding

In this paper, a method to enhance the dynamic characteristics of one-dimension (1D) chaotic maps is first presented. Linear combinations and nonlinear transform based on existing chaotic systems (LNECS) are introduced. Then, a numerical chaotic map (LCLS), based on Logistic map and Sine map, is given. Through the analysis of a bifurcation diagram, Lyapunov exponent (LE), and Sample entropy (SE), we can see that CLS has overcome the shortcomings of a low-dimensional chaotic system and can be used in the field of cryptology. In addition, the construction of eight functions is designed to obtain an S-box. Finally, five security criteria of the S-box are shown, which indicate the S-box based on the proposed in this paper has strong encryption characteristics. The research of this paper is helpful for the development of cryptography study such as dynamic construction methods based on chaotic systems.


2022 ◽  
pp. 1-12
Author(s):  
Suyue Li ◽  
Fanyi Meng ◽  
Jian Xiong ◽  
Lina Bariah ◽  
Sami Muhaidat ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document