chaotic encryption
Recently Published Documents


TOTAL DOCUMENTS

288
(FIVE YEARS 85)

H-INDEX

23
(FIVE YEARS 4)

2021 ◽  
Author(s):  
Abdelhalim Kamrani ◽  
Khalid Zenkouar ◽  
Said Najah ◽  
Hakim El Fadili

Abstract In this paper, we propose three novel image encryption algorithms. Separable moments and parallel computing are combined in order to enhance the security aspect and time performance. The three proposed algorithms are based on TKM (Tchebichef-Krawtchouk moments), THM (Tchebichef- Hahn moments) and KHM (Krawtchouk-Hahn moments) respectively. A novel chaotic scheme is introduced, which allows for the encryption steps to run si multaneously. The proposed algorithms are tested under several criteria and the experimental results show a remarkable resilience against all well-known attacks. Furthermore, the novel parallel encryption scheme exhibits a drastic improvement in the time performance. The proposed algorithms are compared to the state-of-the-art methods and they stand out as a promising choice for reliable use in real world applications.


2021 ◽  
Vol 13 (6) ◽  
pp. 1-14
Author(s):  
Lianshan Liu ◽  
Xiaoli Wang ◽  
Lingzhuang Meng ◽  
Gang Tian ◽  
Ting Wang

On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption domain based on odevity verification was proposed. The original image was scrambled and encrypted by Henon mapping, and the redundancy between the pixels of the encrypted image was lost. Then, the embedding capacity of watermarking can be improved by using odevity verification, and the embedding location of watermarking can be randomly selected by using logistic mapping. When extracting the watermarking, the embedded data was judged according to the odevity of the pixel value of the embedding position of the watermarking, and the carrier image was restored nondestructively by odevity check image. The experimental results show that the peak signal-to-noise ratio (PSNR) of the original image is above 53 decibels after the image is decrypted and restored after embedding the watermarking in the encrypted domain, and the invisibility is good.


2021 ◽  
Author(s):  
Ning Lin ◽  
Xiaoming Chen ◽  
Chunwei Xia ◽  
Jing Ye ◽  
Xiaowei Li
Keyword(s):  

2021 ◽  
Vol 13 (6) ◽  
pp. 0-0

On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption domain based on odevity verification was proposed. The original image was scrambled and encrypted by Henon mapping, and the redundancy between the pixels of the encrypted image was lost. Then, the embedding capacity of watermarking can be improved by using odevity verification, and the embedding location of watermarking can be randomly selected by using logistic mapping. When extracting the watermarking, the embedded data was judged according to the odevity of the pixel value of the embedding position of the watermarking, and the carrier image was restored nondestructively by odevity check image. The experimental results show that the peak signal-to-noise ratio (PSNR) of the original image is above 53 decibels after the image is decrypted and restored after embedding the watermarking in the encrypted domain, and the invisibility is good.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yiying Liu ◽  
Young Chun Ko

This paper provides an in-depth study and analysis of image processing for graphic design through chaotic encryption combined with a wavelet transform algorithm. Firstly, the traditional Mallat algorithm is optimized; since the mean value of the transform coefficients generated after the wavelet transform of the image is used as the initial value of the chaotic system to iterate, when the image is modified, then the mean value of the wavelet coefficients will also change, and the final iteration comes out as two different sequences using the property that the chaotic system is extremely sensitive to the initial conditions, so the algorithm has a certain sensitivity to tampering and localization effect. The image of the encrypted graphic design is decrypted by the chaos decryption system, and the final image information of the graphic design is obtained. In terms of the security of the graphic design image itself, the complex dynamical properties of chaos are fully utilized to encrypt it, and the algorithm has a good encryption effect after statistical characteristic analysis, attack complexity, difference analysis, adjacent pixel correlation analysis, and key sensitivity analysis. The plaintext image is decomposed in odd-even sequence using the boosting algorithm to get the sequence with an even index and the sequence with an odd index; then, the diffusion algorithm is applied to the two sequences by the prediction and update algorithm, and this process is repeated many times to get the two ciphertext sequences after scrambling, merging these two sequences, and matrixing them to get the ciphertext image. Finally, the testing of the embedded planar designed image revolves around four aspects, namely, image processing, tamper sensitivity, robustness, and imperceptibility, to examine the designed planar designed image system. In the diffusion manipulation, the key matrix for diffusion is obtained using the threshold processing method of the Local Binary Pattern (LBP) algorithm for the matrices generated by the Logistic Chaos system, which improves the randomness of the algorithm. The experimental results verify the effectiveness and security of the algorithm.


Entropy ◽  
2021 ◽  
Vol 23 (11) ◽  
pp. 1431
Author(s):  
Zirui Zhang ◽  
Ping Chen ◽  
Weijun Li ◽  
Xiaoming Xiong ◽  
Qianxue Wang ◽  
...  

In actual application scenarios of the real-time video confidential communication, encrypted videos must meet three performance indicators: security, real-time, and format compatibility. To satisfy these requirements, an improved bitstream-oriented encryption (BOE) method based chaotic encryption for H.264/AVC video is proposed. Meanwhile, an ARM-embedded remote real-time video confidential communication system is built for experimental verification in this paper. Firstly, a 4-D self-synchronous chaotic stream cipher algorithm with cosine anti-controllers (4-D SCSCA-CAC) is designed to enhance the security. The algorithm solves the security loopholes of existing self-synchronous chaotic stream cipher algorithms applied to the actual video confidential communication, which can effectively resist the combinational effect of the chosen-ciphertext attack and the divide-and-conquer attack. Secondly, syntax elements of the H.264 bitstream are analyzed in real-time. Motion vector difference (MVD) coefficients and direct-current (DC) components in Residual syntax element are extracted through the Exponential-Golomb decoding operation and entropy decoding operation based on the context-based adaptive variable length coding (CAVLC) mode, respectively. Thirdly, the DC components and MVD coefficients are encrypted by the 4-D SCSCA-CAC, and the encrypted syntax elements are re-encoded to replace the syntax elements of the original H.264 bitstream, keeping the format compatibility. Besides, hardware codecs and multi-core multi-threading technology are employed to improve the real-time performance of the hardware system. Finally, experimental results show that the proposed scheme, with the advantage of high efficiency and flexibility, can fulfill the requirement of security, real-time, and format compatibility simultaneously.


2021 ◽  
Vol 10 (11) ◽  
pp. 718
Author(s):  
Yu Li ◽  
Liming Zhang ◽  
Xiaolong Wang ◽  
Xingang Zhang ◽  
Qihang Zhang

Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods for vector maps have good robustness in resisting geometric attacks but poor resistance to vertex attacks (e.g., addition, deletion, etc.). To solve this problem, here we propose a novel invariant-based CEW algorithm for vector maps, which consists of permutation-based encryption scheme and coordinates-based watermarking scheme. In the encryption scheme, the encryption key is generated via the Gaussian distribution method combined with the SHA-512 hash method; then, the double random position permutation strategy is applied to the vector map encryption. In watermarking embedding scheme, the original watermark image is scrambled via logistic chaotic encryption before embedding, and the coordinates of all the vertices are normalized. Then, the scrambled watermark image is embedded into the normalized coordinates. Results show that: proposed method is more robust to conventional attacks (e.g., vertex addition and deletion, reordering and data format conversion) and geometric attacks (e.g., scaling and translation). In addition, compared with the existing CEW methods for vector maps, the proposed method has higher security and stronger robustness against vertex attacks.


Author(s):  
G Bindu ◽  
◽  
Dr. R .A Karthika ◽  

The vehicular ad hoc networks are vulnerable to security threats while communication is established in wireless made proper encryption scheme can aid in establishing effective and secure communication. Conventionally group key agreement model (GKA) scheme is widely used for enabling security in VANET networks which is insignificant because of their over exploitation of resources in the network. In order to establish a secure communication in VANETs, a novel multi scroll attractor (MSA)based chaotic Henon maps encryption approach is proposed. The extensive experimentations has been carried out in the proposed scheme and it proves to satisfy all the security requirements of VANET scenario.


2021 ◽  
Author(s):  
Zehao Wang ◽  
Huan Yuan ◽  
Yang Deng ◽  
Jinping Zhang ◽  
JiaGui Wu

Sign in / Sign up

Export Citation Format

Share Document