A Survey on Cryptographic Algorithms Using Fractal Structures

Author(s):  
Sneh Lata Aswal ◽  
Ashish Negi

Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission of images to protect the authenticity, integrity and confidentiality of images. Fractal images can be used as a strong key for the encryption due to the random and chaotic nature of fractals. The infinite boundaries of fractals provide highly complex structure that leads to confusion and it becomes a tedious task for an unauthenticated user to crack the exact secret fractal key. In this paper, a review of various techniques used for image encryption using fractal geometry has been illustrated. All these techniques have their own advantages and disadvantages in terms of execution time, key generation time and Peak Signal to Noise Ratio.

2021 ◽  
Author(s):  
paavni gaur

Abstract An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14, for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will further be implemented by me.The paper shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image.


Author(s):  
Ramireddy Navatejareddy ◽  
Muthukuru Jayabhaskar ◽  
Bachala Sathyanarayana

<p>Image <span>encryption enables users to safely transmit digital photographs via a wireless medium while maintaining enhanced anonymity and validity. Numerous studies are being conducted to strengthen picture encryption systems. Elliptical curve cryptography (ECC) is an effective tool for safely transferring images and recovering them at the receiver end in asymmetric cryptosystems. This method's key generation generates a public and private key pair that is used to encrypt and decrypt a picture. They use a public key to encrypt the picture before sending it to the intended user. When the receiver receives the image, they use their private key to decrypt it. This paper proposes an ECC-dependent image encryption scheme utilizing an enhancement strategy based on the gravitational search algorithm (GSA) algorithm. The private key generation step of the ECC system uses a GSA-based optimization process to boost the efficiency of picture encryption. The image's output is used as a health attribute in the optimization phase, such as the peak signal to noise ratio (PSNR) value, which demonstrates the efficacy of the proposed approach. As comparison to the ECC method, it has been discovered that the suggested encryption scheme offers better optimal PSNR </span>values.</p>


2020 ◽  
Vol 6 (7) ◽  
pp. 70
Author(s):  
Shafali Agarwal

Fractal’s spatially nonuniform phenomena and chaotic nature highlight the function utilization in fractal cryptographic applications. This paper proposes a new composite fractal function (CFF) that combines two different Mandelbrot set (MS) functions with one control parameter. The CFF simulation results demonstrate that the given map has high initial value sensitivity, complex structure, wider chaotic region, and more complicated dynamical behavior. By considering the chaotic properties of a fractal, an image encryption algorithm using a fractal-based pixel permutation and substitution is proposed. The process starts by scrambling the plain image pixel positions using the Henon map so that an intruder fails to obtain the original image even after deducing the standard confusion-diffusion process. The permutation phase uses a Z-scanned random fractal matrix to shuffle the scrambled image pixel. Further, two different fractal sequences of complex numbers are generated using the same function i.e. CFF. The complex sequences are thus modified to a double datatype matrix and used to diffuse the scrambled pixels in a row-wise and column-wise manner, separately. Security and performance analysis results confirm the reliability, high-security level, and robustness of the proposed algorithm against various attacks, including brute-force attack, known/chosen-plaintext attack, differential attack, and occlusion attack.


Author(s):  
Paavni Gaur

Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will further be implemented by me. The paper shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image.


Photonics ◽  
2021 ◽  
Vol 8 (6) ◽  
pp. 208
Author(s):  
Xiangqing Wang ◽  
Jie Zhang ◽  
Bo Wang ◽  
Kongni Zhu ◽  
Haokun Song ◽  
...  

With the increase in the popularity of cloud computing and big data applications, the amount of sensitive data transmitted through optical networks has increased dramatically. Furthermore, optical transmission systems face various security risks at the physical level. We propose a novel key distribution scheme based on signal-to-noise ratio (SNR) measurements to extract the fingerprint of the fiber channel and improve the physical level of security. The SNR varies with time because the fiber channel is affected by many physical characteristics, such as dispersion, polarization, scattering, and amplifier noise. The extracted SNR of the optical fiber channel can be used as the basis of key generation. Alice and Bob can obtain channel characteristics by measuring the SNR of the optical fiber channel and generate the consistent key by quantization coding. The security and consistency of the key are guaranteed by the randomness and reciprocity of the channel. The simulation results show that the key generation rate (KGR) can reach 25 kbps, the key consistency rate (KCR) can reach 98% after key post-processing, and the error probability of Eve’s key is ~50%. In the proposed scheme, the equipment used is simple and compatible with existing optic fiber links.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 535
Author(s):  
Karim H. Moussa ◽  
Ahmed I. El Naggary ◽  
Heba G. Mohamed

Multimedia wireless communications have rapidly developed over the years. Accordingly, an increasing demand for more secured media transmission is required to protect multimedia contents. Image encryption schemes have been proposed over the years, but the most secure and reliable schemes are those based on chaotic maps, due to the intrinsic features in such kinds of multimedia contents regarding the pixels’ high correlation and data handling capabilities. The novel proposed encryption algorithm introduced in this article is based on a 3D hopping chaotic map instead of fixed chaotic logistic maps. The non-linearity behavior of the proposed algorithm, in terms of both position permutation and value transformation, results in a more secured encryption algorithm due to its non-convergence, non-periodicity, and sensitivity to the applied initial conditions. Several statistical and analytical tests such as entropy, correlation, key sensitivity, key space, peak signal-to-noise ratio, noise attacks, number of pixels changing rate (NPCR), unified average change intensity randomness (UACI), and others tests were applied to measure the strength of the proposed encryption scheme. The obtained results prove that the proposed scheme is very robust against different cryptography attacks compared to similar encryption schemes.


Author(s):  
Yongxin Zhao ◽  
Zheng Kuang ◽  
Ying Wang ◽  
Lei Li ◽  
Xiaozeng Yang

Abstract Last two decades, the studies on microRNAs (miRNAs) and the numbers of annotated miRNAs in plants and animals have surged. Herein, we reviewed the current progress and challenges of miRNA annotation in plants. Via the comparison of plant and animal miRNAs, we pinpointed out the difficulties on plant miRNA annotation and proposed potential solutions. In terms of recalling the history of methods and criteria in plant miRNA annotation, we detailed how the major progresses made and evolved. By collecting and categorizing bioinformatics tools for plant miRNA annotation, we surveyed their advantages and disadvantages, especially for ones with the principle of mimicking the miRNA biogenesis pathway by parsing deeply sequenced small RNA (sRNA) libraries. In addition, we summarized all available databases hosting plant miRNAs, and posted the potential optimization solutions such as how to increase the signal-to-noise ratio (SNR) in these databases. Finally, we discussed the challenges and perspectives of plant miRNA annotations, and indicated the possibilities offered by an all-in-one tool and platform according to the integration of artificial intelligence.


Author(s):  
Bhattiprolu Nagasirisha ◽  
V. V. K. D. V. Prasad

Electromyography (EMG) signal recording equipment is comparatively modern. Still, there are enough restrictions in detection, recording, and characterization of EMG signals because of nonlinearity in the equipment, which leads to noise components. The most commonly affecting artifacts are Power Line Interference (PLI-Noise), Baseline Wander noise (BW-Noise), and Electrocardiogram noise (ECG-Noise). Adaptive filters are advanced and effective solutions for EMG signal denoising, but the improper tuning of filter coefficients leads to noise components in the denoised EMG signal. This defect in adaptive filters triggers or motivates us to optimize the filter coefficients with existing meta-heuristics optimization algorithms. In this paper, Least Mean Squares (LMS) filter and Recursive Least Squares (RLS) adaptive filter coefficients are optimized with a new Hybrid Firefly–Particle Swarm Optimization (HFPSO) by taking the advantages and disadvantages of both the algorithms. Experiments are conducted with the proposed HFPSO and it proved better in EMG signal denoising in terms of the measured parameters like signal-to-noise ratio (SNR) in dB, maximum error (ME), mean square error (MSE), etc. In the second part of the work, the denoised EMG signal features are extracted for the diagnosis of diseases related to myopathy and neuropathy as EMG signal reflects the neuromuscular function and EMG signal examination may contribute to the diagnosis of muscle disorder linked to myopathy and neuropathy.


2017 ◽  
Vol 7 (1.3) ◽  
pp. 42
Author(s):  
Bennilo Fernandes.J ◽  
Sivakannan S ◽  
Prabakaran N ◽  
G. Thirugnanam

In this contemporary world procuring our confidential data against some unknown person is very significant. Thus to have a high reliability of data security watermarking technique is applied before transmitting the data. This proposed work LCWT and DGT decomposition gives an effective technique to protect hypertensive related information based on reversible watermarking. LCWT has the superiority of multi-resolution fundamental analysis of wavelet transform and reflects representation of image domain in LCT. And using DGT decomposition the patient information has to embed inside high frequency subband wavelet and the watermarked information will be extracted by the receiver without any loss, to reconstruct the original image information. The reliability of the proposed method is analyzed by comparing the experimental results of similarity index, normalization and peak signal to noise ratio.


Sign in / Sign up

Export Citation Format

Share Document