chaotic cryptography
Recently Published Documents


TOTAL DOCUMENTS

50
(FIVE YEARS 16)

H-INDEX

12
(FIVE YEARS 2)

2021 ◽  
Vol 10 (4) ◽  
pp. 2100-2109
Author(s):  
Amal Abdulbaqi Maryoosh ◽  
Zahraa Salah Dhaif ◽  
Raniah Ali Mustafa

In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The proposed scheme was based on multiple stages of confusion and diffusion. The diffusion process was implemented twice, first, by permuting the pixels of the plain image by using an Arnold cat map and, the second time by permuting the plain image pixels via the proposed permutation algorithm. The confusion process was performed many times, by performing the XOR operation between the two resulted from permuted images, subtracted a random value from all pixels of the image, as well as by implementing the mix column on the resulted image, and by used the Lorenz key to obtain the encrypted image. The security analysis tests that used to exam the results of this encryption method were information entropy, key space analysis, correlation, histogram analysis UACI, and NPCR have shown that the suggested algorithm has been resistant against different types of attacks.


Author(s):  
Amine Rahmani

Chaotic cryptography has been a well-studied domain over the last few years. Many works have been done, and the researchers are still getting benefit from this incredible mathematical concept. This paper proposes a new model for coloured image encryption using simple but efficient chaotic equations. The proposed model consists of a symmetric encryption scheme in which it uses the logistic equation to generate secrete keys then an affine recursive transformation to encrypt pixels' values. The experimentations show good results, and theoretic discussion proves the efficiency of the proposed model.


2021 ◽  
Author(s):  
Amber S. Nasim

Chaotic cryptography pronounces the use of chaos theory in specific physical dynamical systems working in chaotic system as measure of communication techniques and computation algorithms to accomplish dissimilar cryptographic tasks in a cryptographic system. We have reviewed some of the recent work on chaos-based cryptography in this piece of work. Cryptography methodologies are critically important for storage of secured media content and transmission over exposed systems, for example, the web. For high security, encryption is one the approach to guard the information from leakage. Image encryption is transformation of image to an inaccurate form so that it can be secured from unauthorized users. To explore application of encryption in time samples pattern, we have recommended a secured approach to code input signals by introducing a new encryption algorithm. The algorithm mechanism is such that the transmitter, an input signal was received and coded into a lengthier series of numbers. At the receiver, the coded signal by the transmitter was received and changed back into its original values. This was done based on the idea that the hidden input signal samples using a specific pattern, could only recoverable by a trusted receiver.


2021 ◽  
Author(s):  
Amber S. Nasim

Chaotic cryptography pronounces the use of chaos theory in specific physical dynamical systems working in chaotic system as measure of communication techniques and computation algorithms to accomplish dissimilar cryptographic tasks in a cryptographic system. We have reviewed some of the recent work on chaos-based cryptography in this piece of work. Cryptography methodologies are critically important for storage of secured media content and transmission over exposed systems, for example, the web. For high security, encryption is one the approach to guard the information from leakage. Image encryption is transformation of image to an inaccurate form so that it can be secured from unauthorized users. To explore application of encryption in time samples pattern, we have recommended a secured approach to code input signals by introducing a new encryption algorithm. The algorithm mechanism is such that the transmitter, an input signal was received and coded into a lengthier series of numbers. At the receiver, the coded signal by the transmitter was received and changed back into its original values. This was done based on the idea that the hidden input signal samples using a specific pattern, could only recoverable by a trusted receiver.


2021 ◽  
pp. 240-248
Author(s):  
Mahmood Khalel Ibrahem ◽  
Hussein Ali Kassim

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time random key used to encrypt each voice data in the RTP packet. Chaotic maps have been used successfully for encryption bulky data such as voice, image, and video, chaotic cryptography has good properties such as long periodicity, pseudo-randomness, and sensitivity to initial conditions and change in system parameters. A VoIP system was successfully implemented based on the on ITU-T G.729 for voice codec, as a multimedia encoding of Real-time Transport Protocol payload data, then, apply a proposed method to generate three-mixed logistic chaotic maps [1] and then analysis the encryption/ decryption quality measures for speech signal based this method. The experimental work demonstrates that the proposed scheme can provide confidentiality to voice data with voice over IP performance quality, minimum lost in transmitted packet, minimum average delay, and minimum jitter.


2020 ◽  
Vol 9 (2) ◽  
pp. 1208-1212

Presently advanced India notoriety, associations are proposing various structures concentrating on computerized encoding procedures. Because of the simplicity of replicating, altering, and altering of computerized archives and pictures has prompted encoding the data required for transmission and capacity. It clear that the connection between's the picture pixels to its neighborhood district is high, decreasing relationship between's the pixels esteem makes it hard to figure for the first picture and along these lines enhance the security. This paper presents a novel picture encoding strategy which at first improves the picture based on exchanging dim codes and pixel blast. The pixel blast utilizes very much characterized key that switches between the dim code of the picture pixels. Exploratory outcomes would demonstrate that the proposed pixel blast is sufficient for fractional encoding and upgrades security of the information. Further, it could likewise bolster as a deadly implement for any current calculation.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Da-jun Huang ◽  
Wen-zhe Zhong ◽  
Jin Zhong ◽  
Dong Jiang ◽  
Hao Wu

Since quantum key distribution (QKD) can provide proven unconditional security guaranteed by the fundamental laws of quantum mechanics, it has attracted increasing attention over the past three decades. Its low bit rate, however, cannot meet the requirements of modern applications. To solve this problem, recently, an efficient and universal QKD protocol based on chaotic cryptography and middleware technology was proposed, which efficiently increases the bit rate of the underlying QKD system. Nevertheless, we find that this protocol does not take the bit errors into account, and one error bit may lead to the failure of the protocol. In this paper, we give an optimized protocol and deploy it on a BB84 QKD platform. The experimental results show that the optimized version provides resistance to bit errors compared with the original version. And the statistical properties of the generated bits are fully assessed using different methods. The evaluation results prove that the proposed protocol can generate bits with outstanding properties.


Entropy ◽  
2020 ◽  
Vol 22 (1) ◽  
pp. 76 ◽  
Author(s):  
Jiayin Yu ◽  
Shiyu Guo ◽  
Xiaomeng Song ◽  
Yaqin Xie ◽  
Erfu Wang

In this paper, a new image encryption transmission algorithm based on the parallel mode is proposed. This algorithm aims to improve information transmission efficiency and security based on existing hardware conditions. To improve efficiency, this paper adopts the method of parallel compressed sensing to realize image transmission. Compressed sensing can perform data sampling and compression at a rate much lower than the Nyquist sampling rate. To enhance security, this algorithm combines a sequence signal generator with chaotic cryptography. The initial sensitivity of chaos, used in a measurement matrix, makes it possible to improve the security of an encryption algorithm. The cryptographic characteristics of chaotic signals can be fully utilized by the flexible digital logic circuit. Simulation experiments and analyses show that the algorithm achieves the goal of improving transmission efficiency and has the capacity to resist illegal attacks.


Sign in / Sign up

Export Citation Format

Share Document