1,908 research outputs found
A Novel Chaotic Image Encryption using Generalized Threshold Function
In this paper, after reviewing the main points of image encryption and
threshold function, we introduce the methods of chaotic image encryption based
on pseudorandom bit padding that the bits be generated by the novel generalized
threshold function (segmentation and self-similarity) methods. These methods
decrease periodic effect of the ergodic dynamical systems in randomness of the
chaotic image encryption. The essential idea of this paper is that given
threshold functions of the ergodic dynamical systems. To evaluate the security
of the cipher image of this scheme, the key space analysis, the correlation of
two adjacent pixels and differential attack were performed. This scheme tries
to improve the problem of failure of encryption such as small key space and
level of security.Comment: 7 pages, 5 figures, Published in international Journal of Computer
Applications (March 2012
A novel pseudo-random number generator based on discrete chaotic iterations
Security of information transmitted through the Internet, against passive or
active attacks is an international concern. The use of a chaos-based
pseudo-random bit sequence to make it unrecognizable by an intruder, is a field
of research in full expansion. This mask of useful information by modulation or
encryption is a fundamental part of the TLS Internet exchange protocol. In this
paper, a new method using discrete chaotic iterations to generate pseudo-random
numbers is presented. This pseudo-random number generator has successfully
passed the NIST statistical test suite (NIST SP800-22). Security analysis shows
its good characteristics. The application for secure image transmission through
the Internet is proposed at the end of the paper.Comment: The First International Conference on Evolving Internet:Internet 2009
pp.71--76 http://dx.doi.org/10.1109/INTERNET.2009.1
Breaking an image encryption algorithm based on chaos
Recently, a chaos-based image encryption algorithm called MCKBA (Modified
Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of
MCKBA and finds that it can be broken with a differential attack, which
requires only four chosen plain-images. Performance of the attack is verified
by experimental results. In addition, some defects of MCKBA, including
insensitivity with respect to changes of plain-image/secret key, are reported.Comment: 10 pages, 4 figure
- …