4 research outputs found

    A Low Computational Cost RGB Color Image Encryption Scheme Process based on PWLCM Confusion, Z/nZ Diffusion and ECBC Avalanche Effect

    Get PDF
    In this work, three sub-processes are serially integrated into just one process in order to construct a robust new image encryption scheme for all types of images, especially color images. This integration architecture aims to create a robust avalanche effect property while respecting the constraints of confusion and diffusion that have been identified by Claude Shannon as properties required of a secure encryption scheme. The performance of the proposed encryption scheme is measured and discussed with several analyses, including computational cost analysis, key space analysis, randomness metrics  analysis, histogram analysis, adjacent pixel correlation, and entropy analysis. The experimental results demonstrated and validated the performance and robustness of the proposed scheme

    A Low Computational Cost RGB Color Image Encryption Scheme Process based on PWLCM Confusion, Z/nZ Diffusion and ECBC Avalanche Effect

    Get PDF
    In this work, three sub-processes are serially integrated into just one process in order to construct a robust new image encryption scheme for all types of images, especially color images. This integration architecture aims to create a robust avalanche effect property while respecting the constraints of confusion and diffusion that have been identified by Claude Shannon as properties required of a secure encryption scheme. The performance of the proposed encryption scheme is measured and discussed with several analyses, including computational cost analysis, key space analysis, randomness metrics  analysis, histogram analysis, adjacent pixel correlation, and entropy analysis. The experimental results demonstrated and validated the performance and robustness of the proposed scheme

    Conception d’un Nouveau Mécanisme Aléatoirement Dynamique Optimisé pour le Chiffrement Basé Chaos d’Images

    Get PDF
    Le traitement de message par message permet de réaliser une cryptanalyse fondée sur l’exploitation du contexte général de l’échange. Dans cet article, pour annuler cette vulnérabilité, nous introduisons un nouveau système cryptographique basé chaos pour le chiffrement des images numériques, son fonctionnement est aléatoirement dynamique fondé sur l'utilisation simultanée de plusieurs attracteurs chaotiques. L’étude expérimentale prouve que ce nouveau système produit un cryptage avec un très bon compromis entre sécurité et rapidité en plus il évite que deux messages aient le même chiffré
    corecore