Shafique, 2022 - Google Patents
A noise-tolerant cryptosystem based on the decomposition of bit-planes and the analysis of chaotic gauss iterated mapShafique, 2022
- Document ID
- 1202787183487751738
- Author
- Shafique A
- Publication year
- Publication venue
- Neural Computing and Applications
External Links
Snippet
Secure communication has become a challenging task for researchers. In these circumstances, several encryption techniques for digital images have been proposed. In this paper, a new cryptosystem for color images is proposed based on the bit-plane …
- 238000004458 analytical method 0 title abstract description 39
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/28—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication using particular encryption algorithm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/582—Pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yosefnezhad Irani et al. | Digital image scrambling based on a new one-dimensional coupled Sine map | |
Gan et al. | A chaotic image encryption algorithm based on 3-D bit-plane permutation | |
Hosny et al. | A color image encryption technique using block scrambling and chaos | |
Chai et al. | A novel image encryption scheme based on DNA sequence operations and chaotic systems | |
Ye et al. | Quantum logistic image encryption algorithm based on SHA-3 and RSA | |
Norouzi et al. | A fast color image encryption algorithm based on hyper-chaotic systems | |
Shafique et al. | Image encryption using dynamic S-box substitution in the wavelet domain | |
Gong et al. | Quantum image encryption algorithm based on quantum image XOR operations | |
Zeghid et al. | A modified AES based algorithm for image encryption | |
Wang et al. | Novel image encryption algorithm based on cycle shift and chaotic system | |
Norouzi et al. | A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process | |
Faragallah et al. | Secure color image cryptosystem based on chaotic logistic in the FrFT domain | |
Ghebleh et al. | An image encryption scheme based on irregularly decimated chaotic maps | |
Rehman et al. | Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps | |
Heucheun Yepdia et al. | A robust and fast image encryption scheme based on a mixing technique | |
Deb et al. | Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR | |
Haider et al. | Block cipher’s nonlinear component design by elliptic curves: an image encryption application | |
Ghebleh et al. | A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation | |
Chen et al. | Generalized optical encryption framework based on Shearlets for medical image | |
Arpacı et al. | Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit | |
Dong et al. | Visually meaningful image encryption scheme based on DWT and schur decomposition | |
Gafsi et al. | Efficient encryption system for numerical image safe transmission | |
Musanna et al. | A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images | |
Shafique | A noise-tolerant cryptosystem based on the decomposition of bit-planes and the analysis of chaotic gauss iterated map | |
Nkandeu et al. | Image encryption algorithm based on synchronized parallel diffusion and new combinations of 1D discrete maps |