Kamat et al., 2014 - Google Patents
Symmetric image encryption algorithm using 3d rossler systemKamat et al., 2014
View PDF- Document ID
- 4275194925594396469
- Author
- Kamat V
- Sharma M
- Publication year
- Publication venue
- International Journal of Computer Science and Business Informatics
External Links
Snippet
Recently a lot of research has been done in the field of image encryption using chaotic maps. In this paper, we propose a new symmetric block cipher algorithm using the 3D Rossler system. The algorithm utilizes the approach used by Mohamed Amin et al.[Commun …
- 230000000739 chaotic 0 abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map | |
Pareek et al. | Image encryption using chaotic logistic map | |
Patidar et al. | A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption | |
Kadir et al. | Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN | |
Shatheesh Sam et al. | An intertwining chaotic maps based image encryption scheme | |
CN106997606B (en) | A kind of image encryption method based on hyperchaotic system Projective Synchronization | |
Solak et al. | Cryptanalysis of a multi-chaotic systems based image cryptosystem | |
Chen et al. | Reusing the permutation matrix dynamically for efficient image cryptographic algorithm | |
CN111597574B (en) | Parallel image encryption system and method based on spatial diffusion structure | |
CN104751401B (en) | A kind of novel Piecewise linear chaotic map image encryption and coding method | |
CN112272262B (en) | Image encryption and decryption method and device | |
CN107592198A (en) | The four-dimensional Hopfield neural network images encryption method of quantum Fourier conversion | |
CN107330338B (en) | Color image encryption and decryption method and system based on double chaotic cross-diffusion | |
CN116886270B (en) | A three-band encryption method based on the national secret algorithm and dual chaos system | |
CN113077373A (en) | Image encryption method based on chaos mapping and bidirectional operation Feistel structure | |
Elamrawy et al. | An image encryption based on DNA coding and 2DLogistic chaotic map | |
Shen et al. | A color image encryption algorithm based on magic cube transformation and modular arithmetic operation | |
CN104182926B (en) | Color image encrypting method based on Hilbert conversion and chaos Liu algorithms | |
Das et al. | Diffusion and encryption of digital image using genetic algorithm | |
Kamat et al. | Symmetric image encryption algorithm using 3d rossler system | |
Al-Tamimi | An improve image encryption algorithm based on multi-level of chaotic maps and lagrange interpolation | |
Munir et al. | Differential cryptanalysis of diffusion and confusion based information confidentiality mechanism | |
Meng et al. | Color Image Encryption Algorithm with ZigZag Transform and DNA Coding Based on Fractional Order 5D Hyperchaotic System | |
Tabash et al. | Image encryption algorithm based on chaotic map | |
Ye et al. | An image encryption scheme based on chaotic systems with changeable parameters |