413 results on '"Chaotic encryption"'
Search Results
2. Parallelizable Chaotic Encryption for Remote Sensing Imagery.
- Author
-
Xing, Meng, Yu, Hai, Zhang, Wei, and Zhu, Zhiliang
- Subjects
- *
REMOTE sensing , *DATA privacy , *JPEG (Image coding standard) , *ALGORITHMS , *PERMUTATIONS - Abstract
High-resolution remote sensing images with complex contents have garnered significant attention for practical applications, which also pose substantial challenges related to space occupation, security, and information privacy. Compression is frequently coupled with encryption to balance the above-mentioned issues. Most existing methods for joint compression and encryption are primarily designed for common low-resolution images. Toward this end, we propose a novel compression-and-encryption algorithm for remote sensing images that maintains the JPEG format compatibility while virtually eliminating the block effects in the encrypted images. A novel block segmentation strategy that is friendly to simple images is first introduced, in which the original image is divided into nonoverlapping sub-blocks that are greater than the blocks in JPEG compression. The key that is utilized to encrypt the values of DC coefficients is generated through a fusion of the 2D Logistic-Sine-Coupling Map and SHA-512. After that, a parallel diffusion method is proposed for all nonzero AC coefficients, which significantly enhances the encryption efficiency. The global blocks permutation is conducted to further improve the security. Extensive experiments are carried out to demonstrate that our encryption scheme is highly efficient, provides enhanced security, and maintains format compliance for JPEG. Meanwhile, the presented method can resist various attacks to a certain extent. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Enhancing medical image security through machine learning and dual watermarking-based technique.
- Author
-
Singh, Kumari Suniti and Singh, Harsh Vikram
- Abstract
As the world becomes increasingly digital, healthcare is no exception. With the ease of sharing e-healthcare records over open networks, smart healthcare systems have become a popular way to manage patient information. But as the popularity of these systems has grown, so has the concern for their security. That's where image security techniques come in. In this paper we have developed a new approach to secure e-patient records like DICOM images. By combining the redundant discrete wavelets transform (RDWT), Hessenberg Decomposition (HD), and randomized singular value decomposition (RSVD). We developed a robust and dual watermarking scheme. This scheme uses multiple watermarks, including Electronic Patient Record (EPR) as text and images, to ensure high-level authentication. In order to attain a balance between imperceptibility and robustness, a PSO-based optimization of scale factor is employed and Turbo code is utilized to encode the EPR and minimize channel noise. Additionally, the marked image undergoes encryption using a 3D chaotic-based encryption technique, and the extracted watermark is denoised through a deep neural network. The result shows that the proposed scheme is both secure and reliable. With this dual watermarking scheme, we have made great strides in securing e-patient records. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Fractional order 1D memristive time-delay chaotic system with application to image encryption and FPGA implementation.
- Author
-
Zourmba, Kotadai, Effa, Joseph Yves, Fischer, Clovis, Rodríguez-Muñoz, José David, Moreno-Lopez, Maria Fernanda, Tlelo-Cuautle, Esteban, and Nkapkop, Jean De Dieu
- Subjects
- *
IMAGE encryption , *LYAPUNOV exponents , *GATE array circuits , *NUMERICAL analysis , *COMPUTER simulation , *BIFURCATION diagrams - Abstract
The memristive chaotic systems have attracted much attention and have been thoroughly discussed. The analysis shows that the fractional-order system is closer to the real system, and the time-delay chaotic systems are of an infinite-dimension with high randomness and unpredictability. Here we consider these three concepts (time delay, fractional order and memristive) to propose a 1D time delay fractional order memristive chaotic system. The analysis of the system is investigated by theoretical analyses and numerical simulations using the Kumar algorithm based on the Caputo definition for fractional order. The results indicate that the system parameter can significantly affect the dynamic behavior, which can be indicated by bifurcation diagrams, Lyapunov exponent diagrams, and phase portraits. A numerical method is adapted here to simulate the system, enabling short-memory implementation using a field-programmable gate array (FPGA). The experimental results were in good agreement with the numerical simulation results. Furthermore, an image encryption scheme based on multi-level diffusion and multi-round diffusion–confusion was developed, which involves diffusion and confusion operations. Security analysis shows the effectiveness of the proposed algorithm in terms of high security and excellent encryption performance. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
5. A Zero-Watermarking Algorithm Based on Scale-Invariant Feature Reconstruction Transform.
- Author
-
Li, Fan and Wang, Zhong-Xun
- Subjects
ALGORITHMS ,DATA analysis ,FEATURE extraction ,PIXELS - Abstract
In order to effectively protect and verify the copyright information of multimedia digital works, this paper proposes a zero-watermarking algorithm based on carrier image feature point descriptors. The constructed feature matrix of this algorithm consists of two parts: the feature descriptor vector calculated from scale-invariant feature reconstruction transform (SIFRT) and the multi-radius local binary pattern (MrLBP) descriptor vector. The algorithm performs a standardization, feature decomposition, and redundancy reduction on the traditional keypoint descriptor matrix, combines it with the texture feature matrix, and achieves the dimensional matching of copyright information. The advantage of this algorithm lies in its non-modification of the original data. Compared to computing global features, the local features computed from a subset of key points reduce the amount of attack interference introduced during copyright verification, thereby reducing the number of erroneous pixel values that are introduced. The algorithm introduces a timestamp mechanism when uploading the generated zero-watermarking image to a third-party copyright center, preventing subsequent tampering. Experimental data analysis demonstrates that the algorithm exhibits good discriminability, security, and robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. A Hybrid Logistic Scroll Chaotic Encryption Algorithm for Ensuring the Cloud Security to Counerfeiting the Attacks.
- Author
-
Swetha, Madireddy and Kathirvelu, Kalaivani
- Subjects
CLOUD computing ,DATA protection ,COMPUTER hacking ,FORGERY ,ALGORITHMS - Abstract
Cloud computing is meant for storing the huge data using third party that ensures that confidential data cannot be accessed by the other users. But with rapid growth of technologies, data in the cloud normally increases which questions its security in storing in the cloud. Hence the protecting the cloud data seeks the strong security levels to counterfeit the different cloud attack. In order to achieve the highest level of security for cloud data, this study suggests a powerful encryption technique that combines chaotic scrolls and logistic maps. The proposed model exhibits the following advantages over the other algorithms: 1) High dynamic key generation 2) ability to counterfeit the multiple attacks 3) High randomness encrypted data which can provide more confusion of hacking from the intruder’s insight. To prove the strength of the proposed model, NIST National Institute of Science and Technology (NIST) is used for significant experiments. in which different statistical tests were carried out to prove the strength of the proposed model. The level of security of the suggested model is also evaluated and investigated using formal analysis using Burrows-Abadi-Needham Logic (BAN). The given model is thoroughly verified using both the Profverif tool and AVISPA. In terms of communication costs and unpredictability, the suggested model's randomness has also been contrasted with that of another existing algorithm. Results demonstrates that the proposed model shows its ability to provide more potent protection to the cloud data than the other existing encryption algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Baker’s Map Based Chaotic Image Encryption in Military Surveillance Systems
- Author
-
Rajendiran, Nithya Paranthaman, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, E. Balas, Valentina, editor, Prakash, Kolla Bhanu, editor, and Varma, G. P. Saradhi, editor
- Published
- 2024
- Full Text
- View/download PDF
8. Secure Image Encryption Using Single-Mode Fiber and Dense Wavelength Division Multiplexing in Chaotic Systems
- Author
-
Al-Saidi, Nadia M. G., Obaiys, Suzan J., Alwan, Nawras A., Mohammed, Arkan J., Farhan, Alaa Kadhim, Karaca, Yeliz, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Gervasi, Osvaldo, editor, Murgante, Beniamino, editor, Garau, Chiara, editor, Taniar, David, editor, C. Rocha, Ana Maria A., editor, and Faginas Lago, Maria Noelia, editor
- Published
- 2024
- Full Text
- View/download PDF
9. Retrievable Image Encryption Based on Adaptive Block Compressed Sensing
- Author
-
Fang, Jiuchuan, Zhao, Hui, Zheng, Mingwen, Wang, Zijian, Niu, Sijie, Gao, Xizhan, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, You, Peng, editor, Liu, Shuaiqi, editor, and Wang, Jun, editor
- Published
- 2024
- Full Text
- View/download PDF
10. Five-dimensional memristive Hopfield neural network dynamics analysis and its application in secure communication
- Author
-
Yin, Xinxing, Chen, Juan, Yu, Wenxin, Huang, Yuan, Wei, Wenxiang, Xiang, Xinjie, and Yan, Hao
- Published
- 2024
- Full Text
- View/download PDF
11. A novel TT-SHO QoS aware and secured Vehicular Adhoc Network (VANET) routing protocol for smart intelligent transportation.
- Author
-
Praba, M. S. Bennet and Ramesh, S. S. Subhaska
- Abstract
Vehicular Ad-hoc Networks (VANET) has attracted many researchers in recent days because of its inevitable applications in smart transportation structure, autonomous vehicles and Internet of Vehicles (IoV). Establishing and maintaining secured end to end connections in a VANET is challenging due to the dynamic changing environment and due to malicious vehicles. To overcome this problem, this paper proposes novel secured protocol TT-SHO which integrates the Tent Tuned Spotted Hyena Optimization (TT-SHO) for routing algorithm and Hybrid Chaotic Encryption for secured data transmission. The proposed routing protocol adopts the TT-SHO for shortest path optimization and transmits the chaotic encrypted data in the shortest path by maintaining the Quality of Services (QoS). The experimentation is carried out in terms of latency (5 ms), Packet Delivery Ratio (PDR) (90), throughput (1 bps) and also compared with existing frameworks. Final results proved that the proposed TT-SHO with Hybrid Chaotic Encryption is suitable for VANET environment by providing safe, reliable and robust data transmission. And the model proves that it provides more reliable secured data transmission by maintaining QoS. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. A new image encryption based on hybrid heterogeneous time-delay chaotic systems.
- Author
-
Zhou, Yuzhen and Zhu, Erxi
- Subjects
IMAGE encryption ,LYAPUNOV exponents ,CHAOS theory ,POSITIVE systems ,CRYPTOGRAPHY ,HOPF bifurcations - Abstract
Chaos theory has been widely utilized in password design, resulting in an encryption algorithm that exhibits strong security and high efficiency. However, rapid advancements in cryptanalysis technology have rendered single system generated sequences susceptible to tracking and simulation, compromising encryption algorithm security. To address this issue, we propose an image encryption algorithm based on hybrid heterogeneous time-delay chaotic systems. Our algorithm utilizes a collection of sequences generated by multiple heterogeneous time-delay chaotic systems, rather than sequences from a single chaotic system. Specifically, three sequences are randomly assigned to image pixel scrambling and diffusion operations. Furthermore, the time-delay chaotic system comprises multiple hyperchaotic systems with positive Lyapunov exponents, exhibiting a more complex dynamic behavior than non-delay chaotic systems. Our encryption algorithm is developed by a plurality of time-delay chaotic systems, thereby increasing the key space, enhancing security, and making the encrypted image more difficult to crack. Simulation experiment results verify that our algorithm exhibits superior encryption efficiency and security compared to other encryption algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. A new image encryption based on hybrid heterogeneous time-delay chaotic systems
- Author
-
Yuzhen Zhou and Erxi Zhu
- Subjects
image encryption ,chaotic encryption ,heterogeneous time-delay chaotic system ,hopf bifurcation ,stability ,Mathematics ,QA1-939 - Abstract
Chaos theory has been widely utilized in password design, resulting in an encryption algorithm that exhibits strong security and high efficiency. However, rapid advancements in cryptanalysis technology have rendered single system generated sequences susceptible to tracking and simulation, compromising encryption algorithm security. To address this issue, we propose an image encryption algorithm based on hybrid heterogeneous time-delay chaotic systems. Our algorithm utilizes a collection of sequences generated by multiple heterogeneous time-delay chaotic systems, rather than sequences from a single chaotic system. Specifically, three sequences are randomly assigned to image pixel scrambling and diffusion operations. Furthermore, the time-delay chaotic system comprises multiple hyperchaotic systems with positive Lyapunov exponents, exhibiting a more complex dynamic behavior than non-delay chaotic systems. Our encryption algorithm is developed by a plurality of time-delay chaotic systems, thereby increasing the key space, enhancing security, and making the encrypted image more difficult to crack. Simulation experiment results verify that our algorithm exhibits superior encryption efficiency and security compared to other encryption algorithms.
- Published
- 2024
- Full Text
- View/download PDF
14. Medical Image Encryption Through Chaotic Asymmetric Cryptosystem
- Author
-
Tutu Raja Ningthoukhongjam, Sursita Devi Heisnam, and Manglem Singh Khumanthem
- Subjects
Blum-Goldwasser cryptosystem ,chaotic encryption ,cryptanalysis ,elliptic curve cryptography ,image encryption ,public key encryption ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In the era of digital advancements, safeguarding medical data holds significant importance. This article introduces a novel approach to encrypting images through public-key encryption, incorporating the properties of Elliptic Curve Cryptography (ECC) and the Blum-Goldwasser Cryptosystem (BGC). The proposed method capitalizes on the chaotic properties of a sequence generator to augment the randomness in the encrypted image. The encryption process initiates with a secure key exchange mechanism using elliptic curves and the Blum-Goldwasser Cryptosystem. Pixel randomization is achieved through a chaotic map, followed by encryption using ECC and BGC, which integrates the discrete logarithmic problem, probabilistic encryption, and the quadratic residuosity problem. Both ECC and BGC components contribute to unpredictability and complexity, fortifying the security measures. The amalgamation of these cryptographic techniques provides resilience against cyber threats such as brute-force attacks and differential cryptanalysis. Thorough simulations and performance assessments affirm the effectiveness and computational efficiency of this hybrid approach when compared to existing methods. The experimental values of information entropy, average correlation, NPCR and UACI are 7.9998, 0.0010, 99.6901% and 33.5260% respectively. The total time taken for the proposed methodology is 0.142 seconds. These values indicates that the proposed hybrid chaotic image encryption method displays promise for diverse applications.
- Published
- 2024
- Full Text
- View/download PDF
15. Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
- Author
-
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, and Veronica Lusiana
- Subjects
Image encryption ,Feistel network ,chaotic encryption ,image cryptosystem ,cryptography ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this research is to address the limitations of current image encryption methods that are vulnerable to statistical and differential attacks. A hash function is also integrated to elevate the key’s security and sensitivity. Unlike standard Feistel networks, which split the plaintext into two parts and employ only XOR operations at the bit level, this research’s Feistel Network modification involves dividing the plaintext into four sections and introducing a diverse set of operations, including substitution and permutation at both the bit and byte levels across different parts, thereby optimizing confusion and diffusion effects. The empirical evaluation demonstrates that this method significantly reduces pixel correlation and strengthens encryption against statistical and differential attacks. Supported by various analytical tools like entropy analysis, NPCR, UACI, chi-square, key space and sensitivity analysis, robustness testing, and NIST suite evaluations, the proposed method significantly enhances image encryption performance. In conclusion, the proposed method effectively secures image data and sets a new benchmark in image encryption. The significance of this research lies in its integration of complex, chaotic dynamics and advanced encryption mechanisms, providing a substantial contribution to digital information security.
- Published
- 2024
- Full Text
- View/download PDF
16. Multi-Domain Multi-Level Optical Encryption Transmission Scheme Based on Memristor Rulkov Neuron Chaos
- Author
-
Zhiruo Guo, Bo Liu, Jianxin Ren, Qing Zhong, Yaya Mao, Xiangyu Wu, Wenchao Xia, Xiumin Song, Shuaidong Chen, Ying Li, Feng Wang, and Yongfeng Wu
- Subjects
Memristor Rulkov neuron chaos ,chaotic encryption ,physical layer security ,flexible optical access ,Applied optics. Photonics ,TA1501-1820 ,Optics. Light ,QC350-467 - Abstract
This paper proposes a multi-domain multi-level (MDML) orthogonal frequency division multiplexing (OFDM) optical encryption transmission scheme based on memristor Rulkov neuron chaos. In this scheme, the masking factors generated by the memristor Rulkov neuron chaos are used to encrypt the information of the digital modulation process, so as to improve the anti-malicious attack performance of the system. Among them, the memristor unit constructs a simple discrete map to capture the complex nonlinear neuronal behavior, and the generated masking factors encrypt the data in the digital modulation process. In addition, the proposed scheme introduces the encryption depth control parameters (EDCP), which can make up for the information damage caused by the complexity of encryption. The selection of EDCP can not only encrypt the data, but also change the distribution of the uniformly distributed constellation points position, reduce the average power of the constellation points, and improve the transmission performance of the fiber communication system. A 9.41 Gb/s OFDM signal transmission over 25 km standard single-mode fiber (SSMF) is experimentally demonstrated. The introduction of memristor Rulkov neurons makes the key space reach 10116. The introduction of the EDCP makes the key space expand 1036 times. When the bit error rate (BER) is 10−2, the receiving sensitivity of the EDCP with 0.2, 0.4, 0.8 is 6 dB higher than that of the EDCP with 0.9, 0.3, 0.1. The results show that the encryption scheme can effectively resist illegal attacks and improve the security performance of the system.
- Published
- 2024
- Full Text
- View/download PDF
17. An image encryption algorithm based on the double time-delay Lorenz system
- Author
-
Yuzhen Zhou, Erxi Zhu, and Shan Li
- Subjects
image encryption ,chaotic encryption ,double time-delay lorenz system ,hopf bifurcation ,Biotechnology ,TP248.13-248.65 ,Mathematics ,QA1-939 - Abstract
The traditional image encryption technology has the disadvantages of low encryption efficiency and low security. According to the characteristics of image information, an image encryption algorithm based on double time-delay chaos is proposed by combining the delay chaotic system with traditional encryption technology. Because of the infinite dimension and complex dynamic behavior of the delayed chaotic system, it is difficult to be simulated by AI technology. Furthermore time delay and time delay position have also become elements to be considered in the key space. The proposed encryption algorithm has good quality. The stability and the existence condition of Hopf bifurcation of Lorenz system with double delay at the equilibrium point are studied by nonlinear dynamics theory, and the critical delay value of Hopf bifurcation is obtained. The system intercepts the pseudo-random sequence in chaotic state and encrypts the image by means of scrambling operation and diffusion operation. The algorithm is simulated and analyzed from key space size, key sensitivity, plaintext image sensitivity and plaintext histogram. The results show that the algorithm can produce satisfactory scrambling effect and can effectively encrypt and decrypt images without distortion. Moreover, the scheme is not only robust to statistical attacks, selective plaintext attacks and noise, but also has high stability.
- Published
- 2023
- Full Text
- View/download PDF
18. Secure patient data transmission on resource constrained platform.
- Author
-
Afzal, Ifrah, Parah, Shabir A., Hurrah, Nasir N, and Song, O.Y.
- Abstract
Electronic Health Record, which comprises of medical imagery, patient history, prescription and clinical observations is a highly sensitive data. This data is not generally sent over the network in its original form as it is prone to numerous security related issues. Generally, some encryption algorithms are applied on the data (medical image) before transmission over the network. However, resource constrained devices cannot perform complex encryption sand the process of encryption is entrusted to some third party like Cloud. But this third-party encryption requires the privacy of data to be preserved. After ensuring the privacy and performing third party encryption, the encrypted data can be securely transmitted over the network. This concept is used in the proposed work and a secure data transmission method is implemented. We have used two encryption techniques viz, chaotic encryption and bitplane encryption on the medical image which gives extra security to the image. While using the facilities of cloud for encryption (chaotic) the proposed method ensures that the cloud administrators get no hint about the information present in the data that is sent to them. In addition, the authenticity of the medical images is ensured and the encryption time obtained is small (must criterion for real time applications). The objectives of our work are verified by experimentations that are carried out on various medical images. The experimental results and theoretical analysis confirm the effectiveness of proposed work in terms of encryption time, security and authenticity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. A Hierarchical Multiscenario H.265/HEVC Video Encryption Scheme.
- Author
-
Xing, Meng, Yu, Hai, Zhang, Wei, and Zhu, Zhiliang
- Subjects
- *
STREAMING video & television , *VIDEO coding , *STREAMING media , *IMAGE encryption , *VIDEOS - Abstract
With the pervasive application of video streaming, the security of streaming media information continually faces new challenges. Most existing encryption methods employ uniform criteria for encrypting all scenarios, leading to unnecessary mutual inhibition of algorithm security and coding efficiency. Furthermore, several encryption algorithms are inadequate for high-resolution videos. A novel, independently hierarchical video cryptosystem for H.265/high efficiency video coding (HEVC) is proposed that develops a scene-adaptive encryption strategy tailored for multiscenario videos. Additionally, we fully consider the seeds of pseudo-random number generators, syntax components in compressed codes, and scenario indicators. We analyze the visibility of encrypted videos in different scenarios and the encryption performance of various syntax parameters based on the integration of encryption for three distinct scenario categories to further enhance encryption efficiency and security. The method's versatility is demonstrated using a diverse array of videos with significant and insignificant inter-frame motion information across varying resolutions. The experimental results from the video datasets indicate that our scheme effectively balances security and coding efficiency. Furthermore, the scene-adaptive approach can be tailored flexibly according to subscriber needs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Strengthening Network Security through Chaotic Maps-Augmented ChaCha20 Encryption: An Extensive Exploration.
- Author
-
Jayan, Josh K.
- Subjects
COMPUTER network security ,DATA integrity ,IMAGE encryption ,DATA transmission systems ,DATA encryption ,RESEARCH personnel ,QUANTUM computing - Abstract
In an era characterized by unparalleled levels of data exchange and communication, ensuring the security of network transmissions emerges as a paramount concern. This paper undertakes a comprehensive exploration aimed at bolstering network security through the integration of Chaotic Maps with the robust ChaCha20 encryption algorithm. This pioneering approach seeks to introduce an additional stratum of intricacy and unpredictability to data encryption processes, thereby augmenting the confidentiality and integrity of information in transit. The investigation delves deeply into the theoretical underpinnings, practical implementation intricacies, thorough security analysis, and diverse real-world applications of this enhanced encryption framework. By offering a multifaceted examination, this study provides invaluable insights and guidance not only for network professionals but also for researchers operating within this dynamic field. Through its rigorous examination and innovative proposals, this paper contributes significantly to the ongoing discourse surrounding network security enhancement strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
21. Performance evaluation of an encrypted color image transmission over wireless network with different chaotic-based techniques.
- Author
-
Naguib, Ahmed, El‑Shafai, Walid, and Shokair, Mona
- Abstract
Nowadays, there are massive demands on the broadband multimedia services. Data security in today's world is an essential issue in different aspects of life such as marketing services, defense, financial, and health care. Modulation schemes, channel coding, diversity techniques, etc., are types of physical layer security methods, which are used to ensure the data from unauthorized access. In addition, various cryptographic techniques are usually used to secure data transmission between sender and the intended receiver. The combination of cryptographic techniques and physical layer security schemes makes it better for transferring multimedia data through unsecure or potentially risky communication (wired and wireless) path. Many chaotic-based encryption algorithms have been suggested to ensure confidentiality and security for multimedia data over an insecure wireless channel. Cryptography techniques do not involve any system complexity but add a little computation complexity. Use of advanced processors mitigates the computational burden. In this paper, we have discussed efficient transmission of an encrypted color image through a multiple-input multiple-output-orthogonal frequency division multiplexing (MIMO–OFDM) system over a Rayleigh fading with an additive white Gaussian noise channel. Four schemes of chaotic-based encryption are employed. Both 2 × 2 MIMO - OFDM and 4 × 4 MIMO - OFDM wireless communication systems are presented. Peak signal-to-noise ratio metric is used to evaluate the quality of the received image at different signal-to-noise ratios. Other metrics such as number of changing pixel rate, unified averaged changed intensity, correlation coefficient, entropy, and histogram are evaluated. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. Multistage Encryption of Mammogram Images Using Fractional Fourier Transform and 3D Chaotic Map
- Author
-
Das, Banhi, Saha, Arijit, Sikder, Somali, Li, Kan, Editor-in-Chief, Li, Qingyong, Associate Editor, Fournier-Viger, Philippe, Series Editor, Hong, Wei-Chiang, Series Editor, Liang, Xun, Series Editor, Wang, Long, Series Editor, Xu, Xuesong, Series Editor, Kiran Mai, C., editor, Vasundhara, D. N., editor, Siva Kumar, P. V., editor, Srujan Raju, K., editor, Mukkamala, Raghava Rao, editor, Nagini, S., editor, Brahmananda Reddy, A., editor, Ramesh, G. S., editor, Baby, V., editor, and Venkateswara Rao, P., editor
- Published
- 2023
- Full Text
- View/download PDF
23. Deep Learning for Classification of Encrypted Images
- Author
-
Ambrish, R., Amritha, P. P., Lakshmy, K. V., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Senjyu, Tomonobu, editor, So-In, Chakchai, editor, and Joshi, Amit, editor
- Published
- 2023
- Full Text
- View/download PDF
24. Image Compression-Encryption Scheme Based on SPIHT Coding and 2D Beta Chaotic Map
- Author
-
Elkhalil, Najet, Weddy, Youssouf Cheikh, Ejbali, Ridha, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Abraham, Ajith, editor, Pllana, Sabri, editor, Casalino, Gabriella, editor, Ma, Kun, editor, and Bajaj, Anu, editor
- Published
- 2023
- Full Text
- View/download PDF
25. CHAOS BASED CRYPTOGRAPHY AND RECTANGULAR SHAPE BASED STEGANOGRAPHY TECHNIQUE USING LSB.
- Author
-
S, Aiswarya and R, Gomathi
- Subjects
CRYPTOGRAPHY ,IMAGE transmission ,NUMERICAL calculations ,STATISTICAL correlation - Abstract
Multimedia means text, image, audio or video file and transferring multimedia files through the internet are noticeable one. Multimedia securing techniques are additionally used to protect the file. Securing multimedia image file is difficult by using formal encryption techniques such as AES, RSA because of high correlation between pixels. For encryption, chaotic map with XOR function is used and to provide double protection, steganography technique is used. After the encryption, encrypted image is hidden into the cover image file using LSB-steganography. For that, from the cover image, the rectangular positioned pixel values are selected and the encrypted image values are hidden into the selected rectangular positioned pixel locations of the cover file. Embedded image i.e., stego image is transmitted to the recipient through the internet and the reversal process is carried over at the retriever side. The performance of this proposed algorithm is evaluated by using many numerical calculations such as NPCR, UACI and PSNR. Correlation analysis is also performed and the values of the secret image is compared with the chaotic map encrypted image. The obtained average NPCR, UACI and PSNR values are 99.8004%, 37.6773% and 46.41 respectively. These values are compared with existing methods. After retrieving the secret image, the PSNR value is calculated and is high as 46.41dB. From the analysis, it is clear that the chaotic map based image cryptography and steganography method provides more security and robustness in the wireless secret image transmission [ABSTRACT FROM AUTHOR]
- Published
- 2023
26. 双混沌自同步流密码算法的设计与应用.
- Author
-
李 宏, 张子睿, and 陈 平
- Subjects
STREAM ciphers ,DISCRETE-time systems ,IMAGE encryption ,VIDEO surveillance ,ALGORITHMS ,CIPHERS - Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
27. Robust Zero Watermarking Algorithm for Medical Images Based on Improved NasNet-Mobile and DCT.
- Author
-
Dong, Fangchun, Li, Jingbing, Bhatti, Uzair Aslam, Liu, Jing, Chen, Yen-Wei, and Li, Dekai
- Subjects
DIGITAL image watermarking ,CONVOLUTIONAL neural networks ,INFORMATION technology security ,DIGITAL watermarking ,FEATURE extraction ,DISCRETE cosine transforms ,DIGITAL images - Abstract
In the continuous progress of mobile internet technology, medical image processing technology is also always being upgraded and improved. In this field, digital watermarking technology is significant and provides a strong guarantee for medical image information security. This paper offers a robustness zero watermarking strategy for medical pictures based on an Improved NasNet-Mobile convolutional neural network and the discrete cosine transform (DCT) to address the lack of robustness of existing medical image watermarking algorithms. First, the structure of the pre-training network NasNet-Mobile is adjusted by using a fully connected layer with 128 output and a regression layer instead of the original Softmax layer and classification layer, thus generating a regression network with 128 output, whereby the 128 features are extracted from the medical images using the NasNet-Mobile network with migration learning. Migration learning is then performed on the modified NasNet-Mobile network to obtain the trained network, which is then used to extract medical image features, and finally the extracted image features are subjected to DCT transform to extract low frequency data, and the perceptual hashing algorithm processes the extracted data to obtain a 32-bit binary feature vector. Before performing the watermark embedding, the watermark data is encrypted using the chaos mapping algorithm to increase data security. Next, the zero watermarking technique is used to allow the algorithm to embed and extract the watermark without changing the information contained in the medical image. The experimental findings demonstrate the algorithm's strong resistance to both conventional and geometric assaults. The algorithm offers some practical application value in the realm of medicine when compared to other approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map.
- Author
-
Jiang, Mingfang and Yang, Hengfu
- Subjects
- *
IMAGE encryption , *ALGORITHMS , *PERMUTATIONS , *LYAPUNOV exponents , *ENTROPY (Information theory) , *BIFURCATION diagrams - Abstract
To improve the randomness of the Chebyshev chaotic sequences by coupling the Logistic map and the Chebyshev map, a new one-dimensional Logistic–Chebyshev chaotic map (LCCM) is first presented in this paper. Several tests, including the bifurcation diagram, Lyapunov exponents, and information entropy, are employed to analyze the dynamics of the LCCM. The proposed LCCM has better ergodicity and unpredictability than the traditional Chebyshev map. Next, a new image encryption algorithm based on the LCCM and multi-level manipulation is proposed. The LCCM is used to control the pixel permutation, bit-level shuffling, and subsequent pixel diffusion based on the modulo and XOR operation. Extensive experiments, including histogram analysis, information entropy, adjacent pixel correlation, and key sensitivity, show that the image encryption algorithm has high security and can effectively resist malicious attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure.
- Author
-
Wen, Heping, Kang, Shenghao, Wu, Zhuxi, Lin, Yiting, and Huang, Yiming
- Subjects
- *
IMAGE encryption , *RNA , *COLOR codes , *CIPHERS - Abstract
This paper proposes a dynamic RNA-encoded color image encryption scheme based on a chain feedback structure. Firstly, the color pure image is decomposed into red, green, and blue components, and then a chaotic sequence based on plaintext association is introduced to encrypt the red component. Secondly, the intermediate ciphertext is obtained by diffusion after encryption by bit-level permutation, RNA dynamic encoding, RNA dynamic operation rules, and RNA dynamic decoding. Finally, to enhance the security of the image cryptosystem, the green and blue components of the image are repeatedly encrypted using the chain encryption mechanism associated with the intermediate ciphertext to obtain the color cryptographic image. In this paper, a 2D-SFHM chaotic system is used to provide pseudo-random chaotic sequences, and its initial key is calculated by combining the hash function and external parameters of the image, and the one-time ciphertext encryption strategy causes the proposed encryption to effectively resist cryptographic attacks. Experimental results and security analysis show that our encryption algorithm has excellent encryption effects and security performance against various typical attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. Data hiding in encryption–compression domain.
- Author
-
Singh, O. P. and Singh, A. K.
- Subjects
CONVOLUTIONAL neural networks ,SINGULAR value decomposition ,IMAGE encryption ,WAVELET transforms ,DIGITAL watermarking - Abstract
This paper introduces a robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain. First, host image is transformed using lifting wavelet transform, Hessenberg decomposition and redundant singular value decomposition. Then, we use appropriate scaling factor to invisibly embed the singular value of watermark data into the lower frequency sub-band of the host image. We also use suitable encryption-then-compression scheme to improve the security of the image. Additionally, de-noising convolutional neural network is performed at extracted mark data to enhance the robustness of the scheme. Experimental results verify the effectiveness of our scheme, including embedding capacity, robustness, invisibility, and security. Further, it is established that our scheme has a better ability to recover concealed mark than conventional ones at low cost. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. 基于深度学习的人脸图像加密算法研究.
- Author
-
鲁瑞, 张南, and 辛君芳
- Abstract
Copyright of Computer Measurement & Control is the property of Magazine Agency of Computer Measurement & Control and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
32. High-quality color image compression-encryption using chaos and block permutation
- Author
-
Heping Wen, Yiming Huang, and Yiting Lin
- Subjects
Image encryption ,Chaotic encryption ,Compression and encryption ,Frequency domain compression ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper proposes a high-quality color image compression-encryption scheme based on chaos and block permutation. In this scheme, the color digital image is first converted and sampled in the YCbCr gamut, and then the coefficients in the sub-blocks are extracted for compression coding after 8×8 post-blocking discrete cosine transformation (DCT) to the frequency domain. Then, an image encryption algorithm using chaos-based block permutation and two-round row-column diffusion is designed for the compressed frequency domain information. In terms of security, a chaos-based block permutation module is designed, which includes the encryption operations of block scrambling, block rotation and inversion, pixel value complement and color component interchange to enhance security. In addition, a mechanism for associating plaintext and intermediate ciphertext is introduced to generate dynamic chaotic sequences to effectively resist various cryptographic attacks. Moreover, the joint compression-encryption reduces the computational complexity of the encrypted object significantly and improves the efficiency. The simulation results show that the joint compression-encryption scheme has the advantages of high compression ratio and high image recovery quality, and has a fairly high security level to resist common cryptographic attacks. Therefore, the compression-encryption scheme proposed in this paper is a preferred and promising method for protecting the privacy of digital images.
- Published
- 2023
- Full Text
- View/download PDF
33. A Zero-Watermarking Algorithm Based on Scale-Invariant Feature Reconstruction Transform
- Author
-
Fan Li and Zhong-Xun Wang
- Subjects
zero-watermarking ,local feature extraction ,chaotic encryption ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
In order to effectively protect and verify the copyright information of multimedia digital works, this paper proposes a zero-watermarking algorithm based on carrier image feature point descriptors. The constructed feature matrix of this algorithm consists of two parts: the feature descriptor vector calculated from scale-invariant feature reconstruction transform (SIFRT) and the multi-radius local binary pattern (MrLBP) descriptor vector. The algorithm performs a standardization, feature decomposition, and redundancy reduction on the traditional keypoint descriptor matrix, combines it with the texture feature matrix, and achieves the dimensional matching of copyright information. The advantage of this algorithm lies in its non-modification of the original data. Compared to computing global features, the local features computed from a subset of key points reduce the amount of attack interference introduced during copyright verification, thereby reducing the number of erroneous pixel values that are introduced. The algorithm introduces a timestamp mechanism when uploading the generated zero-watermarking image to a third-party copyright center, preventing subsequent tampering. Experimental data analysis demonstrates that the algorithm exhibits good discriminability, security, and robustness.
- Published
- 2024
- Full Text
- View/download PDF
34. Reversible Data Hiding for JPEG Image Based on Paillier Encryption
- Author
-
Ma, Bin, Zhang, Baona, Wang, Chunpeng, Li, Jian, Wang, Yuli, Cui, Xinan, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Sun, Xingming, editor, Zhang, Xiaorui, editor, Xia, Zhihua, editor, and Bertino, Elisa, editor
- Published
- 2022
- Full Text
- View/download PDF
35. Colour Image Encryption Based on Fisher-Yates Algorithm and Chaotic Maps
- Author
-
Ravi, Renjith V., Goyal, S. B., Djeddi, Chawki, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Djeddi, Chawki, editor, Siddiqi, Imran, editor, Jamil, Akhtar, editor, Ali Hameed, Alaa, editor, and Kucuk, İsmail, editor
- Published
- 2022
- Full Text
- View/download PDF
36. Network Synchronization of MACM Circuits and Its Application to Secure Communications.
- Author
-
Méndez-Ramírez, Rodrigo, Arellano-Delgado, Adrian, and Murillo-Escobar, Miguel Ángel
- Subjects
- *
CHAOS synchronization , *SYNCHRONIZATION , *CHAOTIC communication , *IMAGE encryption , *ELECTRONIC circuits , *TELECOMMUNICATION systems - Abstract
In recent years, chaotic synchronization has received a lot of interest in applications in different fields, including in the design of private and secure communication systems. The purpose of this paper was to achieve the synchronization of the Méndez–Arellano–Cruz–Martínez (MACM) 3D chaotic system coupled in star topology. The MACM electronic circuit is used as chaotic nodes in the communication channels to achieve synchronization in the proposed star network; the corresponding electrical hardware in the slave stages receives the coupling signal from the master node. In addition, a novel application to the digital image encryption process is proposed using the coupled-star-network; and the switching parameter technique is finally used to transmit an image as an encrypted message from the master node to the slave coupled nodes. Finally, the cryptosystem is submitted to statistical tests in order to show the effectiveness in multi-user secure image applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. Multilevel Modulated Chaotic Encryption and Belief Propagation Decoding.
- Author
-
Sakoda, K.
- Subjects
IMAGE encryption ,BIT error rate ,MIMO systems - Abstract
Due to the increasing channel capacity of multiple input multiple output (MIMO) systems, we herein propose a multilevel modulated chaotic encryption method to allow belief propagation (BP) decoding in massive MIMO systems. The proposed scheme was reconstructed based on a previous scheme: binary modulated chaotic encryption for allowing BP decoding. In the encryption method of the proposed scheme, constellation points in general multilevel modulation were encrypted by rotating them by an arbitrary angle using chaos rules. Numerical results showed that the proposed scheme has high performance with regard to the bit error ratio and security. Thus, the proposed scheme could be practical and may also increase the channel capacity of massive MIMO systems using chaotic encryption. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Robust and efficient multi-level security framework for color medical images in telehealthcare services.
- Author
-
El-Shafai, Walid and Hemdan, Ezz El-Din
- Abstract
Recently, medical color images significantly affect the efficient diagnosis process and investigation of critical diseases besides mitigating the misdiagnosis problems. Surplus, the theft problem of medical identity and information has been a severe privacy apprehension in the healthcare realm. This paper introduces an efficient digital multi-level security system for medical color images based on fusion, watermarking, and encryption techniques through utilizing singular value decomposition (SVD), discrete wavelet transform (DWT), chaotic encryption process, and wavelet-based fusion algorithm. The fundamental concept of the suggested system is to isolate the three RGB color components of the medical image. Afterward, a fusion process is introduced to fuse every separated color component with a grayscale image. After that, every fused image is encrypted with a chaotic encryption scheme. Finally, the SVD and DWT are utilized to embed the resulting three encrypted fused images into the three RGB components of the original (host) medical color image to obtain the watermarked medical color image. Thus, the proposed system can effectively distribute medical data amongst two different remote organizations in smart telemedicine systems. The performance evaluation of the suggested system is examined by numerous color medical images and diverse severe attacking scenarios on the transmitted medical color images. The simulation tests reveal that the watermarked medical color images resulted from the suggested system are robust against channel assaults like a blur, Gaussian, compression, wrap, cropping, and rotation. Also, the simulation outcomes verified that the suggested system could recognize the recovered watermarks although the presence of different multimedia attacks on the watermarked images. More tests and outcomes prove that the suggested security system is adequate and robust against channel attacks contrasted with previous security systems. The suggested security system achieves high PSNR values and superior quality results. Also, it introduces high correlation outcomes in the presence of channel attacks and provides less computational processing time. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Proceso optimizado para el multiplexado y encriptación de códigos QR.
- Author
-
Vargas Valencia, J. and Granados López, A.
- Subjects
- *
TWO-dimensional bar codes , *IMAGE encryption , *STORAGE , *MEMORY , *MULTIPLEXING , *IMAGE stabilization - Abstract
The image multiplexing and encryption process developed in our previous woks has been optimized to store and hide the information contained in the two first chapters of "Don Quijote de la Mancha", which is stored and encoded in 298 QR codes of 512 pix on each side and then compressed into a complex package. The storage is carried out at the Fourier domain by using theta modulation, where the optimal filter and storage method for this type of images are analyzed, looking for memory savings and facilitating the packet encryption. The proposed encryption method implies the superposition of amplitude and phase with chaotic masks and a linear transformation for the image stabilization. Several security tests are carried out to demonstrate the strength of the encryption. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection.
- Author
-
Chen, Xin, Wang, Qianxue, Fan, Linfeng, and Yu, Simin
- Subjects
- *
IMAGE encryption , *NUMERICAL analysis , *PROBLEM solving - Abstract
Due to the equivalent keys revealed by a chosen-plaintext attack or a chosen-ciphertext attack, most of the existing chaotic image encryption schemes are demonstrated to be insecure. In order to improve security performance, some scholars have recently proposed the plaintext-related chaotic image encryption scheme. Although the equivalent effect of a one-time pad is achieved, an additional secure channel is required to transmit the hash values or other parameters related to the plaintext before the ciphertext can be decrypted at the receiving end. Its main drawback is that an absolutely secure channel is needed to transmit the information related to the plaintext, which is not feasible in practical applications. To further solve this problem, this paper proposes a chaotic image encryption scheme based on global dynamic selection of a multi-parallel structure. First, a chaotic sequence is employed to dynamically select DNA encoding rules. Secondly, the permutation with a multi-parallel structure is performed on the DNA-encoded matrix, and the DNA decoding rules are dynamically selected according to another chaotic sequence. Finally, the diffusion rules obtained by the ciphertext feedback mechanism are introduced to determine the dynamic diffusion. Compared with the existing local dynamic encryption schemes, the main advantage of this scheme is that it can realize global dynamic selection, so as to ensure that there is no equivalent key, and it can resist the chosen-ciphertext attack or chosen-plaintext attack and does not need an additional secure channel to transmit parameters related to plaintext, which is practical. A theoretical analysis and numerical experiments demonstrate the feasibility of the method. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. A Chaotic Encryption System Based on DNA Coding Using a Deep Neural Network.
- Author
-
Sudha, K. Antony, Castro, V. Cibi, MuthuLakshmi, G., Parithi, T. Ilam, and Raja, S. P.
- Subjects
- *
CONVOLUTIONAL neural networks , *DNA , *COMPUTER vision , *TECHNOLOGICAL innovations , *NUCLEOTIDE sequence - Abstract
Critical to computer vision applications, deep learning demands a massive volume of training data for great performance. However, encrypting the sensitive information in a photograph is fraught with difficulty, despite rapid technological advancements. The Advanced Encryption System (AES) is the bedrock of classical encryption technologies. The Data Encryption Standard (DES) has low sensitivity, with weak anti-hacking capabilities. In a chaotic encryption system, a chaotic logistic map is employed to generate a key double logistic sequence, and deoxyribonucleic acid (DNA) matrices are created by DNA coding. The XOR operation is carried out between the DNA sequence matrix and the key matrix. Finally, the DNA matrix is decoded to obtain an encrypted image. Given that encrypted images are susceptible to attacks, a rapid and efficient Convolutional Neural Network (CNN) denoiser is used that enhances the robustness of the algorithm by maximizing the resolution of rebuilt images. The use of a key mixing percentage factor gives the proposed system vast key space and great key sensitivity. Its implementation is examined using statistical techniques such as histogram analysis, information entropy, key space analysis and key sensitivity. Experiments have shown that the suggested system is secure and robust to statistical and noise attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. Chaotic encryption of real-time ECG signal in embedded system for secure telemedicine.
- Author
-
Murillo-Escobar, D., Cruz-Hernández, C., López-Gutiérrez, R.M., and Murillo-Escobar, M.A.
- Subjects
- *
ELECTROCARDIOGRAPHY , *TELEMEDICINE , *NONLINEAR functions , *ELECTROENCEPHALOGRAPHY , *DIAGNOSIS , *OXYGEN saturation - Abstract
Security in telemedicine has been of great interest in recent years due to the personal and confidential information that is used, since it is sent or stored through insecure channels, which generates a security problem such in telemetry, where biomedical signals (ECG, EEG, SpO2) are used for diagnosis of diseases. In this work, a chaos-based cryptographic algorithm is proposed using two-dimensional Badola map implemented in an embedded system based on a 32-bit microcontroller to provide confidentiality of biomedical signals such as the electrocardiogram for applications in low-cost secure embedded systems in telemedicine for monitoring or diagnosis. The electrocardiogram (ECG) signal is acquired in real-time through a medical ECG module, which allows us to measure the ECG signal directly of the patient in real-time. In addition, we propose to use a simple non-linear function over the ECG signal to increase considerably the sensitivity at plain biosignal in the encryption process. In experimental results, several security analyzes are presented such as key space, secret key sensitivity, clear signal sensitivity, histograms, correlation coefficient and encryption time. The results show that the proposed chaotic encryption algorithm is resistant against common attacks and it can be used in secure low-cost embedded systems for telemedicine applications. • Encryption algorithm based on 2D Badola chaotic map is presented for real-time ECG medical signal. • Simple non-linear function is applied to ECG to add plain biosignal sensitivity in encryption. • Several security analyzes over real-time ECG data and cryptograms generated in embedded system are presented. • A low-cost secure embedded system with chaotic cryptography is proposed for telemedicine applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. A New Differential Frequency Hopping Scheme based on Chaotic Encryption Algorithm
- Author
-
Ai-bing YIN and Yi LI
- Subjects
differential frequency hopping ,g function ,chaotic encryption ,frequency hopping ,Applied optics. Photonics ,TA1501-1820 - Abstract
Aiming at the problem that the two-dimensional uniformity of the frequency hopping pattern in differential frequency hopping communication is poor, and the frequency hopping frequency is easy to be eavesdropped, this paper designs an encryption scheme based on the pseudo-random sequence of logistic chaotic map to randomly scramble the frequency hopping pattern. After verification, the differential frequency hopping pattern after encryption and scramble is compared with the original frequency hopping pattern. Although the performance of the system is reduced, the correlation between frequencies is reduced, and the two-dimensional uniformity is improved, which has strong anti-deciphering ability.
- Published
- 2022
- Full Text
- View/download PDF
44. A New Differential Frequency Hopping Scheme based on Chaotic Encryption Algorithm
- Author
-
YIN Ai-bing and LI Yi
- Subjects
differential frequency hopping ,G function ,chaotic encryption ,frequency hopping ,Applied optics. Photonics ,TA1501-1820 - Abstract
Aiming at the problem that the two-dimensional uniformity of the frequency hopping pattern in differential frequency hopping communication is poor, and the frequency hopping frequency is easy to be eavesdropped, this paper designs an encryption scheme based on the pseudo-random sequence of logistic chaotic map to randomly scramble the frequency hopping pattern. After verification, the differential frequency hopping pattern after encryption and scramble is compared with the original frequency hopping pattern. Although the performance of the system is reduced, the correlation between frequencies is reduced, and the two-dimensional uniformity is improved, which has strong anti-deciphering ability.
- Published
- 2022
- Full Text
- View/download PDF
45. Design of 9-D global chaotic system and its application in secure communication
- Author
-
Liu, Meiting, Yu, Wenxin, Wang, Junnian, Chen, Yu, and Bian, Yuyan
- Published
- 2022
- Full Text
- View/download PDF
46. A robust technique for biometric image authentication using invisible watermarking.
- Author
-
Garg, Payal and Jain, Ajit
- Subjects
DIGITAL watermarking ,BIOMETRY ,WATERMARKS ,SINGULAR value decomposition ,BIOMETRIC fingerprinting ,BIOMETRIC identification - Abstract
In the present digital era, the number of ways to misuse multimedia data increases day by day. The availability of high image editing tools can change the image so it becomes challenging to predict the data. Watermarking is one of the techniques which can protect the identity of users. This is a highly secured method to protect digital images. In the presented paper, we suggested a more robust image watermarking approach using DWT-SVD with Chaotic encryption. This work mainly focuses on the protection of biometric images. The entropy map (blocks of 4 × 4) is estimated to apply for 2D discrete wavelet transformation (DWT). The LL band is considered for the watermark embedding process because of holding more information about the original image. Further, an orthogonal matrix is obtained using (Singular value decomposition) SVD and edge entropy-based thresholding is used. The chaotic encryption is performed over a watermark image. The encrypted form of copyright image is used to embed into that orthogonal matrix for performing watermarking. The results evaluated using fingerprints and gait biometrics datasets show the robustness of the proposed approach. The performance of the technique is evaluated using BER, PSNR and NC. The watermark is less fragile after testing under various noise and geometrical attacks. The technique's performance is also compared with recent techniques in this domain, where the proposed method outperforms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. STREAM ENCRYPTION METHOD BASED ON THE CHAOTIC BROWNIAN MOTION MODEL OF MOLECULES.
- Author
-
Gasimov, Vagif A., Mammadov, Jabir I., and Mammadzada, Nargiz F.
- Subjects
CRYPTOGRAPHY ,POINT processes ,MOLECULES ,CIPHERS ,BROWNIAN motion - Abstract
In terms of cryptanalysis resistance, chaos-based encryption methods, along with other methods, have recently become popular. As an XOR cipher, pseudo-random numbers generated by chaotic processes are typically used in such methods. In this study, the collision points in the process based on the chaotic movement of molecules with collisions are used to calculate pseudo-random numbers. In the process of encryption and decryption of information with XOR cipher, pseudo-random numbers are calculated according to the same rule. The use of XOR cipher generated on the basis of complex movement trajectories of molecules in cryptographic conversion processes significantly increases the duration of the suggested method to perform cryptanalysis. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. A new hardware architecture of lightweight and efficient real-time video chaos-based encryption algorithm.
- Author
-
Hadjadj, Mahieddine Anouar, Sadoudi, Said, Azzaz, Mohamed Salah, Bendecheche, Hichem, and Kaibou, Redouane
- Abstract
In this paper, we propose a novel chaotic-based encryption scheme for securing real-time video data. The proposed encryption algorithm is based on the One-Time Pad (OTP) scheme and the unified Lorenz chaotic generator. The peculiarity of the latter is that it can change the chaotic system's and its behaviour as well as its parameters. This provides the system with an important dynamic reconfiguration dimension, especially for real-time applications, in case the key is under attack. As a result, the attacker is obliged to perform these calculations again and again. The 3D unified chaotic generator can switch between three chaotic systems according to a control parameter. As a result, the cryptosystem will offer several advantages, namely a very large dimension of the secret key, low resource and energy consumption and low latency. An extensive security and differential analysis have been performed, demonstrating the high resistance of the proposed scheme to different attacks. The proposed encryption algorithm is validated for real-time video through an experimental implementation of FPGA interfaced with a camera. Experimental results indicate that the proposed hardware architecture is very promising since it provides good performance and can be useful in many embedded applications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Design and Analysis of a Secure Coded Communication System Using Chaotic Encryption and Turbo Product Code Decoder
- Author
-
Khavya, S., Balasubramanian, Karthi, Yamuna, B., Mishra, Deepak, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Thampi, Sabu M., editor, Gelenbe, Erol, editor, Atiquzzaman, Mohammed, editor, Chaudhary, Vipin, editor, and Li, Kuan-Ching, editor
- Published
- 2021
- Full Text
- View/download PDF
50. A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function
- Author
-
Jiao, Ge, Liu, Jiahao, Zhou, Sheng, Luo, Ning, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Liu, Qi, editor, Liu, Xiaodong, editor, Shen, Tao, editor, and Qiu, Xuesong, editor
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.