image cryptosystem
Recently Published Documents


TOTAL DOCUMENTS

144
(FIVE YEARS 61)

H-INDEX

19
(FIVE YEARS 4)

2022 ◽  
Vol 149 ◽  
pp. 106784
Author(s):  
Fan Wang ◽  
Renjie Ni ◽  
Jun Wang ◽  
Zheng Zhu ◽  
Yuhen Hu

Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 334
Author(s):  
Li Li ◽  
Ahmed A. Abd El-Latif ◽  
Sajad Jafari ◽  
Karthikeyan Rajagopal ◽  
Fahimeh Nazarimehr ◽  
...  

Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data cryptosystems. In this paper, a novel chaotic oscillator is presented. The oscillator has a particular property in which the chaotic dynamics are around pre-located manifolds. Various dynamics of the oscillator are studied. After analyzing the complex dynamics of the oscillator, it is applied to designing a new image cryptosystem, in which the results of the presented cryptosystem are tested from various viewpoints such as randomness, time encryption, correlation, plain image sensitivity, key-space, key sensitivity, histogram, entropy, resistance to classical types of attacks, and data loss analyses. The goal of the paper is proposing an applicable encryption method based on a novel chaotic oscillator with an attractor around a pre-located manifold. All the investigations confirm the reliability of using the presented cryptosystem for various IoT applications from image capture to use it.


Optik ◽  
2022 ◽  
pp. 168548
Author(s):  
Subhrajyoti Deb ◽  
Pratap Kumar Behera

2022 ◽  
Vol 70 (1) ◽  
pp. 895-913
Author(s):  
Walid El-Shafai ◽  
Moustafa H. Aly ◽  
Abeer D. Algarni ◽  
Fathi E. Abd El-Samie ◽  
Naglaa F. Soliman

2021 ◽  
Author(s):  
Fatma Mohamed Kamal ◽  
Ahmed Elsaid ◽  
Amr Refaat Elsonbaty

Abstract In this paper, the occurrence of ghost attractor is verified in three cases of a proposed fractional order Rössler blinking system. Firstly, the dynamical behaviors of the short memory fractional order prototype-4 Rössler system with Chua’s diode are explored via bifurcation diagrams and Lyapunov exponents. It is depicted that this system exhibits a variety of dynamics including limit cycles, period doubling and chaos. Then, a proposed non-autonomous fractional order Rössler blinking system is introduced. Numerical simulations are employed to confirm the existence of ghost attractors at specific cases which involve very fast switching time between two composing autonomous fractional subsystems. It is found that the presented fractional order blinking system is very sensitive to system parameters, initial conditions and stochastic process parameters. Thus, the induced chaotic ghost attractor is utilized in a suggested ghost attractor-based chaotic image encryption scheme for first time. Finally, a detailed security analysis is carried out and reveals that the proposed image cryptosystem is immune against different types of attacks such as differential attacks, brute force attacks, cropping and statistical attacks.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Bassem Abd-El-Atty ◽  
Abdullah M. Iliyasu ◽  
Ahmed A. Abd El-Latif

The ubiquity of image and video applications in our daily lives makes data security and privacy prominent concerns for everyone. Among others, various image cryptosystems are relied upon to provide the necessary safeguards. With the inevitable realisation of quantum computing hardware, however, the anticipated quantum supremacy entails effortless violation of the integrity of even the best cryptosystems. Quantum walks (QWs) utilise the potent properties of quantum mechanics to provide randomness via stochastic transitions between states. Our study exploits these properties of QWs to design a multi-image cryptosystem. Furthermore, we infuse the symmetricity and orthogonality of Chebyshev maps into the QWs to realise a powerful cryptosystem that guarantees data integrity, authentication, and anonymity of the resulting images. These properties are validated via extensive simulation-based experiments that produce average values of NPCR as 99.606%, UACI as 33.45%, global entropy as 7.9998, and chi-square test as 238.14. Therefore, the proposed cryptosystem provides ordnance to protect images from illicit tampering during the era.


Sign in / Sign up

Export Citation Format

Share Document