8 research outputs found
Dynamical Analysis and Circuit Design for Malasoma System
In this paper, the Malasoma system based cubic function is presented. This system contains operational amplifiers, resistors, capacitors, multipliers, and voltage sources. The first stage, we analyze the Malasoma model and execute its stability. The phase portraits and bifurcation diagram are used to analyze the dynamic behaviors of the Malasoma model. The proposed circuit was modelled by utilizing NI’s MultiSim software environment. The electronic circuit is realized by using off-the-shelf components. MATLAB and MultiSim simulation results show a good agreement
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
Recently, a chaotic image encryption algorithm based on information entropy
(IEAIE) was proposed. This paper scrutinizes the security properties of the
algorithm and evaluates the validity of the used quantifiable security metrics.
When the round number is only one, the equivalent secret key of every basic
operation of IEAIE can be recovered with a differential attack separately. Some
common insecurity problems in the field of chaotic image encryption are found
in IEAIE, e.g. the short orbits of the digital chaotic system and the invalid
sensitivity mechanism built on information entropy of the plain image. Even
worse, each security metric is questionable, which undermines the security
credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for
illustrating common pitfalls in designing secure communication method for image
data.Comment: 9 pages, 6 figures, IEEE Access, 201
Joint block and stream cipher based on a modified skew tent map
Image encryption is very different from that of texts due to the bulk data capacity and the
high redundancy of images. Thus, traditional methods are difficult to use for image encryption
as their pseudo-random sequences have small space. Chaotic cryptography use chaos
theory in specific systems working such as computing algorithms to accomplish dissimilar
cryptographic tasks in a cryptosystem with a fast throughput. For higher security, encryption
is the approach to guard information and prevent its leakage. In this paper, a hybrid encryption
scheme that combines both stream and block ciphering algorithms is proposed in order
to achieve the required level of security with the minimum encryption time. This scheme is
based on an improved mathematical model to cover the defects in the previous discredited
model proposed by Masuda. The proposed chaos-based cryptosystem uses the improved
Skew Tent Map (STM) RQ-FSTM as a substitution layer. This map is based on a lookup
table to overcome various problems, such as the fixed point, the key space restrictions, and
the limitation of mapping between plain text and cipher text. It uses the same map as a generator
to change the byte position to achieve the required confusion and diffusion effects.
This modification improves the security level of the original STM. The robustness of the
proposed cryptosystem is proven by the performance and the security analysis, as well as
the high encryption speed. Depending on the results of the security analysis the proposed
system has a better dynamic key space than previous ones using STM, a double encryption
quality and a better security analysis than others in the literature with speed convenience to
real-time applications
Pseudonymization of neuroimages and data protection: Increasing access to data while retaining scientific utility
open access articleFor a number of years, facial features removal techniques such as ‘defacing’, ‘skull stripping’ and ‘face masking/ blurring’, were considered adequate privacy preserving tools to openly share brain images. Scientifically, these measures were already a compromise between data protection requirements and research impact of such data. Now, recent advances in machine learning and deep learning that indicate an increased possibility of re- identifiability from defaced neuroimages, have increased the tension between open science and data protection requirements. Researchers are left pondering how best to comply with the different jurisdictional requirements of anonymization, pseudonymization or de-identification without compromising the scientific utility of neuroimages even further. In this paper, we present perspectives intended to clarify the meaning and scope of these concepts and highlight the privacy limitations of available pseudonymization and de-identification techniques. We also discuss possible technical and organizational measures and safeguards that can facilitate sharing of pseudonymized neuroimages without causing further reductions to the utility of the data
Entropy in Image Analysis II
Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas