scholarly journals Text Encryption Method Using multi Hyperchaotic systems

2021 ◽  
Vol 26 (3) ◽  
Author(s):  
Hayder Abood Qasim

With rapid evaluation of technologies, huge amount of critical information can exchange over unsecure network every day, secure and fast encryption schemes become more and more urgent need to provide the desirable confidentiality and thwart unauthorized access, lately and for many reasons, chaotic based encryption algorithms become more and more popular technique due to exceptionally superior characteristics such as simplicity, resistance attacks and high speed, in this paper the advantages of two nonlinear hyper-chaotic systems will utilized to strength the  proposed encryption algorithm, the random sequences generated from systems will used to position scramble and value change of the plaintext, the main features of such method are efficiency, large key space, low computational overhead, and simple design as well as the experimental results demonstrate that the proposed method have more ability to thwart attacks.  

2013 ◽  
Vol 284-287 ◽  
pp. 2992-2997 ◽  
Author(s):  
Xiao Wei Li ◽  
Dong Hwan Kim ◽  
Sung Jin Cho ◽  
Seok Tae Kim

Three dimensional (3-D) images encryption schemes can provide feasible and secure for images encryption due to the 3-D properties of images. In this paper, we present a novel 3-D images encryption algorithm by combining use of integral imaging (II) and maximum-length cellular automata (MLCA) as the secret key ciphering for 3D image encryption technique. In this proposed algorithm, a lenslet array first decomposes the 3-D object into 2-D elemental images (EIs) via the pick-up process of II. We encrypt the 2-D EIs with an encryption method based on linear and complemented MLCA. Decryption process is the opposite of operation encryption process: The 2-D EIs is recovered by the MLCA key, 3-D object is reconstructed by the recovered EIs via computational integral imaging (CII) reconstruction. To verify the usefulness of the proposed algorithm, we carry out the computational experiments and present the experimental results for various attacks. Experimental results show that the proposed algorithm can improve the performance of encryption against various attacks due to large key space in MLCA and 3-D characteristic of data redundancy.


2012 ◽  
Vol 424-425 ◽  
pp. 761-764
Author(s):  
Chuan Kuei Huang ◽  
Hsiau Hsian Nien ◽  
Shu Li Hsu ◽  
Siang Shang Tu

Due to rapid developments in computer networking and communi- cation technology, users have begun to use personal computers to transmit images through the internet. However, this activity puts users at risk of hacker attacks and theft. Although single pixel position shuffling can eliminate an image’s contour, it cannot hide the characteristics of the grey-level spectrum. Because the dynamic trajectories of a chaotic system are highly sensitive to the initial values of the system, applying chaotic-ciphering to the image will result in a good encryption effect, and significantly enhance the key space of the encrypted image. For these reasons, this paper propose a novel and simple Bit-Chaotic-Shuffle (BCS) technique for encryption on color images that is based on multi chaotic systems. This technique not only eliminates image contours, but also disorders the characteristics of the RGB-level spectrum. This encryption method also adopts three chaotic systems in which the key space reaches 10137, thoroughly preventing decryption by an exhaustive attack. This paper further applies the correction coefficient and Mean Square Error (MSE) methods to prove the encryption and the high security performance of the proposed encryption system


Polymers ◽  
2021 ◽  
Vol 13 (9) ◽  
pp. 1358
Author(s):  
Taihui Wu ◽  
Jianshe Ma ◽  
Chengchen Wang ◽  
Haibei Wang ◽  
Liangcai Cao ◽  
...  

An optical encryption method based on computer generated holograms printing of photopolymer is presented. Fraunhofer diffraction is performed based on the Gerchberg-Saxton algorithm, and a hologram of the Advanced Encryption Standard encrypted Quick Response code is generated to record the ciphertext. The holograms of the key and the three-dimensional image are generated by the angular spectrum diffraction algorithm. The experimental results show that large-size encrypted Quick Response (QR) code and miniature keys can be printed in photopolymers, which has good application prospects in optical encryption. This method has the advantages of high-density storage, high speed, large fault tolerance, and anti-peeping.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Baojie Zhang ◽  
Hongxing Li

Universal projective synchronization (UPS) of two chaotic systems is defined. Based on the Lyapunov stability theory, an adaptive control method is derived such that UPS of two different hyperchaotic systems with unknown parameters is realized, which is up to a scaling function matrix and three kinds of reference systems, respectively. Numerical simulations are used to verify the effectiveness of the scheme.


2018 ◽  
Vol 8 (7) ◽  
pp. 1183 ◽  
Author(s):  
Carlos Villaseñor ◽  
Eric Gutierrez-Frias ◽  
Nancy Arana-Daniel ◽  
Alma Alanis ◽  
Carlos Lopez-Franco

Hyperspectral images (HI) collect information from across the electromagnetic spectrum, and they are an essential tool for identifying materials, recognizing processes and finding objects. However, the information on an HI could be sensitive and must to be protected. Although there are many encryption schemes for images and raw data, there are not specific schemes for HI. In this paper, we introduce the idea of crossed chaotic systems and we present an ad hoc parallel crossed chaotic encryption algorithm for HI, in which we take advantage of the multidimensionality nature of the HI. Consequently, we obtain a faster encryption algorithm and with a higher entropy result than others state of the art chaotic schemes.


2019 ◽  
Vol 8 (1) ◽  
pp. 2
Author(s):  
Mehdi Lotfi ◽  
Hossein Kheiri ◽  
Azizeh Jabbari

Introduction:  In this paper, an encryption algorithm for the security of medical images is presented, which has extraordinary security. Given that the confidentiality of patient data is one of the priorities of medical informatics, the algorithm can be used to store and send medical image.Material and Methods:  In this paper, the solutions of chaotic differential equations are used to generate encryption keys. This method is more than other methods used in encoding medical images, resistant to statistics attacks, low encryption and decryption time and very high key space. In the proposed algorithm, unlike other methods that use random key generation, this method uses the production of solutions of the chaotic differential equations in a given time period for generating a key. All simulations and coding are done in MATLAB software.Results:   Chaotic Differential Equations have two very important features that make it possible to encode medical images. One is the unpredictability of the system's behavior and the other is a severe sensitivity to the initial condition.Conclusion: These two features make the method resistant to possible attacks to decode the concept of synchronization chaotic systems. Using the results of the method, medical information can be made safer than existing ones.


Author(s):  
Tawfiq Barhoom ◽  
Mahmoud Abu Shawish

Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it. This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm. The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.


Entropy ◽  
2019 ◽  
Vol 21 (1) ◽  
pp. 44 ◽  
Author(s):  
Sameh Askar ◽  
Abdel Karawia ◽  
Abdulrahman Al-Khedhairi ◽  
Fatemah Al-Ammar

In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks.


Sign in / Sign up

Export Citation Format

Share Document