Nothing Special   »   [go: up one dir, main page]

Shafique, 2022 - Google Patents

A noise-tolerant cryptosystem based on the decomposition of bit-planes and the analysis of chaotic gauss iterated map

Shafique, 2022

Document ID
1202787183487751738
Author
Shafique A
Publication year
Publication venue
Neural Computing and Applications

External Links

Snippet

Secure communication has become a challenging task for researchers. In these circumstances, several encryption techniques for digital images have been proposed. In this paper, a new cryptosystem for color images is proposed based on the bit-plane …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/28Cryptographic mechanisms or cryptographic arrangements for secret or secure communication using particular encryption algorithm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/582Pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Yosefnezhad Irani et al. Digital image scrambling based on a new one-dimensional coupled Sine map
Gan et al. A chaotic image encryption algorithm based on 3-D bit-plane permutation
Hosny et al. A color image encryption technique using block scrambling and chaos
Chai et al. A novel image encryption scheme based on DNA sequence operations and chaotic systems
Ye et al. Quantum logistic image encryption algorithm based on SHA-3 and RSA
Norouzi et al. A fast color image encryption algorithm based on hyper-chaotic systems
Shafique et al. Image encryption using dynamic S-box substitution in the wavelet domain
Gong et al. Quantum image encryption algorithm based on quantum image XOR operations
Zeghid et al. A modified AES based algorithm for image encryption
Wang et al. Novel image encryption algorithm based on cycle shift and chaotic system
Norouzi et al. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process
Faragallah et al. Secure color image cryptosystem based on chaotic logistic in the FrFT domain
Ghebleh et al. An image encryption scheme based on irregularly decimated chaotic maps
Rehman et al. Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps
Heucheun Yepdia et al. A robust and fast image encryption scheme based on a mixing technique
Deb et al. Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR
Haider et al. Block cipher’s nonlinear component design by elliptic curves: an image encryption application
Ghebleh et al. A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation
Chen et al. Generalized optical encryption framework based on Shearlets for medical image
Arpacı et al. Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit
Dong et al. Visually meaningful image encryption scheme based on DWT and schur decomposition
Gafsi et al. Efficient encryption system for numerical image safe transmission
Musanna et al. A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images
Shafique A noise-tolerant cryptosystem based on the decomposition of bit-planes and the analysis of chaotic gauss iterated map
Nkandeu et al. Image encryption algorithm based on synchronized parallel diffusion and new combinations of 1D discrete maps