Speech Scrambling Based on Synchronization of Jointed Dynamic Parameter Chaotic Map

Author(s):  
Abbas Salman Hameed
2014 ◽  
Vol 2014 (1) ◽  
pp. 34-42 ◽  
Author(s):  
N. S. Raghava ◽  
◽  
Ashish Kumar ◽  
Aishwarya Deep ◽  
Abhilasha Chahal ◽  
...  

2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


Author(s):  
Siyamol Chirakkarottu ◽  
Sheena Mathew

Background: Medical imaging encloses different imaging techniques and processes to image the human body for medical diagnostic and treatment purposes. Hence it plays an important role to improve public health. The technological development in biomedical imaging specifically in X-ray, Computed Tomography (CT), nuclear ultrasound including Positron Emission Tomography (PET), optical and Magnetic Resonance Imaging (MRI) can provide valuable information unique to a person. Objective: In health care applications, the images are needed to be exchanged mostly over wireless medium. The diagnostic images with confidential information of a patient need to be protected from unauthorized access during transmission. In this paper, a novel encryption method is proposed to improve the security and integrity of medical images. Methods: Chaotic map along with DNA cryptography is used for encryption. The proposed method describes a two phase encryption of medical images. Results: Performance of the proposed method is also tested by various analysis metrics. Robustness of the method against different noises and attacks is analyzed. Conclusion: The results show that the method is efficient and well suitable to medical images.


2020 ◽  
Vol 14 (12) ◽  
pp. 1724-1724
Author(s):  
Dheerendra Mishra ◽  
Vinod Kumar ◽  
Dharminder Dhaminder ◽  
Saurabh Rana

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 118624-118639
Author(s):  
Chia-Hung Lin ◽  
Jian-Xing Wu ◽  
Pi-Yun Chen ◽  
Hsiang-Yueh Lai ◽  
Chien-Ming Li ◽  
...  

Symmetry ◽  
2021 ◽  
Vol 13 (8) ◽  
pp. 1420
Author(s):  
Chuanfu Wang ◽  
Yi Di ◽  
Jianyu Tang ◽  
Jing Shuai ◽  
Yuchen Zhang ◽  
...  

Dynamic degradation occurs when chaotic systems are implemented on digital devices, which seriously threatens the security of chaos-based pseudorandom sequence generators. The chaotic degradation shows complex periodic behavior, which is often ignored by designers and seldom analyzed in theory. Not knowing the exact period of the output sequence is the key problem that affects the application of chaos-based pseudorandom sequence generators. In this paper, two cubic chaotic maps are combined, which have symmetry and reconfigurable form in the digital circuit. The dynamic behavior of the cubic chaotic map and the corresponding digital cubic chaotic map are analyzed respectively, and the reasons for the complex period and weak randomness of output sequences are studied. On this basis, the digital cubic chaotic map is optimized, and the complex periodic behavior is improved. In addition, a reconfigurable pseudorandom sequence generator based on the digital cubic chaotic map is constructed from the point of saving consumption of logical resources. Through theoretical and numerical analysis, the pseudorandom sequence generator solves the complex period and weak randomness of the cubic chaotic map after digitization and makes the output sequence have better performance and less resource consumption, which lays the foundation for applying it to the field of secure communication.


Micromachines ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 31
Author(s):  
Junxiu Liu ◽  
Zhewei Liang ◽  
Yuling Luo ◽  
Lvchen Cao ◽  
Shunsheng Zhang ◽  
...  

Recent research showed that the chaotic maps are considered as alternative methods for generating pseudo-random numbers, and various approaches have been proposed for the corresponding hardware implementations. In this work, an efficient hardware pseudo-random number generator (PRNG) is proposed, where the one-dimensional logistic map is optimised by using the perturbation operation which effectively reduces the degradation of digital chaos. By employing stochastic computing, a hardware PRNG is designed with relatively low hardware utilisation. The proposed hardware PRNG is implemented by using a Field Programmable Gate Array device. Results show that the chaotic map achieves good security performance by using the perturbation operations and the generated pseudo-random numbers pass the TestU01 test and the NIST SP 800-22 test. Most importantly, it also saves 89% of hardware resources compared to conventional approaches.


Sign in / Sign up

Export Citation Format

Share Document