secured data
Recently Published Documents


TOTAL DOCUMENTS

327
(FIVE YEARS 143)

H-INDEX

9
(FIVE YEARS 5)

2022 ◽  
pp. 33-52
Author(s):  
Nikita Jain ◽  
Vedika Gupta ◽  
Pranav Dass

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Data is big, data is diverse, data comes in zillion formats, it is important to ensure the safety and security of the shared data. With existing systems limited and evolving, the objective of the current research work is to develop a robust Image Encryption technique that is adept and effective at handling heterogeneous data and can withstand state-of-the-art hacking efforts such as brute force attacks, cropping attacks, mathematical attacks, and differential attacks. The proposed Efficient DNA Cryptographic System (EDCS) model presents a pseudorandom substitution method using logistic sine cosine chaotic maps, wherein there is very little correlation between adjacent pixels, and it can decode the image with or without noise, thereby making the proposed system noise-agnostic. The proposed EDCS-based Image model using Chaotic Maps showed enhancements in parameters such as Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), Histogram, and Entropy when compared with existing image security methods.


2021 ◽  
Vol 03 (04) ◽  
pp. 35-46
Author(s):  
Alyaa M. Abdul MAJEED

This paper suggests a novel algorithm for encrypting speech signals in common image formats and retrieve them from these image files. The speech signal is encrypted in three levels. In the first level,the sample positions are permuted based on keys generated using Game of Life matrix and Piecewise linear Chaotic Map (PWLCM) in order to reduce the correlation between adjust samples. In the second level, the resulting samples are then converted to Fast Walsh Hadamard Transform (FWHT) and their transactions are encrypted by using circular transformations in the row and column depending on the generated key. At the third level, the values of encrypted samples are converted to color pixels, which are then arranged in a puzzled manner and put in a 2-D matrix to achieve the secured data transfer across networks, with the image file contains the encrypted speech signal. Several objective measures have been used to evaluate the performance of the suggested method. The experimental results and numerical analyses show that the algorithm gives a high degree of security and robust against brute force attackers, statistical attack, strong diffusion and ambiguity so that the encrypted message has been saved in a different format from the original signal, and finally give the good quality of the reconstructed speech signal from image files.


Sign in / Sign up

Export Citation Format

Share Document