316 research outputs found

    Improving random number generators by chaotic iterations. Application in data hiding

    Full text link
    In this paper, a new pseudo-random number generator (PRNG) based on chaotic iterations is proposed. This method also combines the digits of two XORshifts PRNGs. The statistical properties of this new generator are improved: the generated sequences can pass all the DieHARD statistical test suite. In addition, this generator behaves chaotically, as defined by Devaney. This makes our generator suitable for cryptographic applications. An illustration in the field of data hiding is presented and the robustness of the obtained data hiding algorithm against attacks is evaluated.Comment: 6 pages, 8 figures, In ICCASM 2010, Int. Conf. on Computer Application and System Modeling, Taiyuan, China, pages ***--***, October 201

    Steganography: a class of secure and robust algorithms

    Full text link
    This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property. Thanks to a complete formalization of the approach we prove security against watermark-only attacks of a large class of steganographic algorithms. Finally a complete study of robustness is given in frequency DWT and DCT domains.Comment: Published in The Computer Journal special issue about steganograph

    Audio Encryption Framework Using the Laplace Transformation

    Get PDF
    Digital information, especially multimedia and its applications, has grown exponentially in recent years. It is important to strengthen sophisticated encryption algorithms due to the security needs of these innovative systems. The security of real-time audio applications is ensured in the present study through a framework for encryption. The design framework protects the confidentiality and integrity of voice communications by encrypting audio applications. A modern method of securing communication and protecting data is cryptography. Using cryptography is one of the most important techniques for protecting data and ensuring the security of messaging. The main purpose of this paper is to present a novel encryption scheme that can be used in real-time audio applications. We encrypt the sound using a combination of an infinite series of hyperbolic functions and the Laplace transform, and then decrypt it using the inverse Laplace transform. The modular arithmetic rules are used to generate the key for the coefficients acquired from the transformation. There is no loss of data or noise in the decryption sound. We also put several sound examples to the tes

    Medical image encryption techniques: a technical survey and potential challenges

    Get PDF
    Among the most sensitive and important data in telemedicine systems are medical images. It is necessary to use a robust encryption method that is resistant to cryptographic assaults while transferring medical images over the internet. Confidentiality is the most crucial of the three security goals for protecting information systems, along with availability, integrity, and compliance. Encryption and watermarking of medical images address problems with confidentiality and integrity in telemedicine applications. The need to prioritize security issues in telemedicine applications makes the choice of a trustworthy and efficient strategy or framework all the more crucial. The paper examines various security issues and cutting-edge methods to secure medical images for use with telemedicine systems

    Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key

    Get PDF
    With the rapid growth of communication technology, cryptography plays a significant role in securing and verification of information exchanged via public communication channels.   The current paper introduces a novel method for encrypting/decrypting audio signal using a selected digital image as a complicated key and cover for audio signal.  Each sample of the audio signal is combined with the values of the three color components of a pixel fetched from the cover image yielding a quaternion number.   The absolute value of this quaternion number is then transmitted and when received, the original value of the audio sample can be extracted using simple quaternion mathematics. A second level of complexity can be added to this approach by applying one of the well-known cryptographic techniques (symmetric or asymmetric).   The suggested approach is implemented using Matlab simulation software and the generated audio signal is compared with the original one using some performance metrics.  The obtained results show that the proposed approach is robust and more secure against cryptanalysis attacks
    • …
    corecore