5 research outputs found
SHAH: Hash Function based on Irregularly Decimated Chaotic Map
In this paper, we propose a novel hash function based on irregularly
decimated chaotic map. The hash function called SHAH is based on two Tinkerbell
maps filtered with irregular decimation rule. Exact study has been provided on
the novel scheme using distribution analysis, sensitivity analysis, static
analysis of diffusion and confusion, and collision analysis. The experimental
data show that SHAH satisfied admirable level of security.Comment: accepted for publication in International Journal of Electronics and
Telecommunications, vol. 6
One-Way Hash Function Based on Delay-Induced Hyperchaos
Peer reviewedPostprin
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
Recently, a chaotic image encryption algorithm based on information entropy
(IEAIE) was proposed. This paper scrutinizes the security properties of the
algorithm and evaluates the validity of the used quantifiable security metrics.
When the round number is only one, the equivalent secret key of every basic
operation of IEAIE can be recovered with a differential attack separately. Some
common insecurity problems in the field of chaotic image encryption are found
in IEAIE, e.g. the short orbits of the digital chaotic system and the invalid
sensitivity mechanism built on information entropy of the plain image. Even
worse, each security metric is questionable, which undermines the security
credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for
illustrating common pitfalls in designing secure communication method for image
data.Comment: 9 pages, 6 figures, IEEE Access, 201
Entropy in Image Analysis II
Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas
Entropy in Image Analysis III
Image analysis can be applied to rich and assorted scenarios; therefore, the aim of this recent research field is not only to mimic the human vision system. Image analysis is the main methods that computers are using today, and there is body of knowledge that they will be able to manage in a totally unsupervised manner in future, thanks to their artificial intelligence. The articles published in the book clearly show such a future