1,605 research outputs found

    An Efficient and Secure DNA based Image Encryption Technique

    Get PDF
    In this paper, an efficient and secure DNA based image encryption technique using hyper chaos Lorenz function is proposed. The technique employs SHA-512 hash of gray scale image and primary key to alter the initial seeds of hyper chaos Lorenz function. Initially, chaotic sequences are generated and redesigned. Then, an image is divided into blocks and randomly shuffled according to the primary key. Further perform circular shift operation over the rows of the shuffled image matrix and index based scrambling operation over the columns. After that, perform dynamic encoding and diffusion based DNA algebraic operation over the encoded DNA sequence and DNA based Key sequence using chaotic sequence. Finally, DNA decoding is employed to convert the diffused dynamic matrix into a ciphered image. The dynamicity of the chaotic sequences makes its extraordinary and contributes to the enhanced security and robustness of the technique. Implementation, security and performance analysis demonstrate that the technique has not only an outstanding encryption effect, but also posses large key space, less pixel correlation, low computation time and successfully resilient to the statistical, differential and brute-force attack. Comparative analysis with other references proves its efficiency and practicability for real time applications

    Asymmetric image encryption scheme based on Massey Omura scheme

    Get PDF
    Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security

    Analyzing the Efficiency of a New Image Encryption Method Based on Aboodh Transformations

    Get PDF
    الهدف من هذا البحث هو تطوير طريقة تشفير فريدة من نوعها تستخدم طريقة Aboodh وتحويلها العكسي مع طريقة S-Box. تشير نتائج التقييمات إلى أن هذا العمل مناسب للاستخدام في تطبيقات التشفير الآمنة، ويوفر أدلة فيما يتعلق ببناء نظام تشفير للصور بناءً على السلوكيات المعقدة التي يوضحها. بعد تطبيق المنهجيات التي تم تقديمها لتصوير البيانات المأخوذة من مواقف الحياة الواقعية، تم تقييم النتائج باستخدام مجموعة واسعة من المعايير الإحصائية ومعايير الأداء. نتائج هذا التحقيق تؤدي إلى تحسين موثوقية نظام التشفير.The goal of this research is to develop a unique cryptographic method that makes use of Aboodh and its inverse transform in combination with the S-Box approach. The results of evaluations indicate that this work is appropriate for use in safe cryptographic applications, and it provides clues regarding the building of an image cryptosystem based on the complicated behaviors that it demonstrates. After applying the methodologies that have been provided to depict data taken from real-life situations, the results have been evaluated using a wide variety of statistical and performance criteria. The findings of this investigation result in an improvement to the reliability of the cryptosystem

    An improved public key cryptographic algorithm based on chebyshev polynomials and RSA

    Get PDF
    Due to its very desirable properties, Chebyshev polynomials are often used in the design of public key cryptographic systems. This paper discretizes the Chebyshev mapping, generalizes the properties of Chebyshev polynomials, and proposes an improved public key encryption algorithm based on Chebyshev chaotic mapping and RSA, i.e., CRPKC −Ki. This algorithm introduces alternative multiplication coefficients Ki, the selection of which is determined by the size of Tr(Td(x))mod N = Td(Tr(x))mod N, and the specific value selection rules are shared secrets among participants, overcoming the shortcomings of previous schemes. In the key generation and encryption/decryption stages, more complex intermediate processes are used to achieve higher algorithm complexity, making the algorithm more robust against ordinary attacks. The algorithm is also compared with other RSA-based algorithms to demonstrate its effectiveness in terms of performance and security

    Design of nonlinear observer for chaotic message transmission

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Electronics and Communication Engineering, Izmir, 2013Includes bibliographical references (leaves: 60-64)Text in English; Abstract: Turkish and Englishx, 64 leavesChaos is an interesting nonlinear phenomena that occurs in wide variety of fields. A significant amount of research was devoted to understanding chaos and its properties. After that, researchers focused on searching for possible application areas for chaos to utilize its properties. The need to increase the security of a communication system is considered as a perfect match for chaos and its several properties, yielding chaotic communication. In this thesis, chaotic communication is approached from a control theory perspective. Specifically, three nonlinear observers are designed to extract message encrypted in a chaotic communication signal. The design and stability analysis is presented for the first observer, and the other observers are presented as modifications to the first one. Extensive numerical simulations are performed to demonstrate the viability of the proposed observers. Robustness of the observers to noise, additive disturbances, and parametric mismatch, and security of the observers are demonstrated numerically

    Entropy in Image Analysis III

    Get PDF
    Image analysis can be applied to rich and assorted scenarios; therefore, the aim of this recent research field is not only to mimic the human vision system. Image analysis is the main methods that computers are using today, and there is body of knowledge that they will be able to manage in a totally unsupervised manner in future, thanks to their artificial intelligence. The articles published in the book clearly show such a future

    Entropy in Image Analysis II

    Get PDF
    Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas

    Information Security Using DNA Sequences

    Get PDF
       يعد أمن المعلومات من المواضيع المهمة، ويرجع ذلك أساسًا إلى النمو الهائل في استخدام الإنترنت على مدى السنوات القليلة الماضية. نتيجة لهذا النمو، كانت هناك حالات وصول غير مصرح به، والتي تم تقليلها بفضل "استخدام مجموعة من بروتوكولات الاتصال الآمن، مثل التشفير وإخفاء البيانات". باستخدام القدرات الجزيئية الحيوية للحمض النووي، ازداد استخدام الحمض النووي كناقل للتشفير وإخفاء البيانات في السنوات الأخيرة. أثار إدراك أن الحمض النووي قد يعمل كوسيط نقل أثار هذه الحركة. في هذه الدراسة، نفحص أولاً ونلخص بإيجاز تطور نظام ترميز الحمض النووي الحالي. بعد ذلك، يتم تصنيف الطرق العديدة التي تم بها استخدام الحمض النووي لتحسين تقنيات التشفير. تمت مناقشة مزايا وعيوب هذه الخوارزميات وأحدث التطورات في تقنيات التشفير القائم على الحمض النووي. أخيرًا، نقدم أفكارنا حول المستقبل المحتمل لخوارزميات التشفير القائمة على الحمض النووي.Information security is a significant cause for concern, mainly because of the explosive growth in internet usage over the last few years. Due to this growth, there have been occurrences of unauthorized access, which have been reduced thanks to “using a range of secure communication protocols, such as encryption and data concealment”. Using DNA's bio-molecular capabilities, the usage of DNA as a carrier for encryption and data concealing has increased in recent years. The realization that DNA may function as a transport medium sparked this movement. In this study, we first examine and briefly outline the evolution of the present DNA coding system. After that, the several ways DNA has been used to enhance encryption techniques are categorized. The benefits and drawbacks of these algorithms and the most recent advancements in DNA-based encryption techniques are discussed. Finally, we provide our thoughts on the potential future of DNA-based encryption algorithms. &nbsp
    corecore