[go: up one dir, main page]

Agarwal, 2020 - Google Patents

A new composite fractal function and its application in image encryption

Agarwal, 2020

View HTML
Document ID
16786413064391715494
Author
Agarwal S
Publication year
Publication venue
Journal of imaging

External Links

Snippet

Fractal's spatially nonuniform phenomena and chaotic nature highlight the function utilization in fractal cryptographic applications. This paper proposes a new composite fractal function (CFF) that combines two different Mandelbrot set (MS) functions with one control …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise

Similar Documents

Publication Publication Date Title
Masood et al. A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map
Feng et al. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform
Ramasamy et al. An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map
Zhang et al. Chaos-based image encryption: Review, application, and challenges
Chowdhary et al. Analytical study of hybrid techniques for image encryption and decryption
Alexan et al. Rgb image encryption through cellular automata, s-box and the lorenz system
Alghamdi et al. A lightweight image encryption algorithm based on chaotic map and random substitution
Murillo-Escobar et al. Suggested integral analysis for chaos-based image cryptosystems
Khairullah et al. Designing 1D chaotic maps for fast chaotic image encryption
Huang et al. A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion
El-Latif et al. Efficient chaos-based substitution-box and its application to image encryption
Alghamdi et al. Image encryption algorithms: a survey of design and evaluation metrics
Agarwal Secure image transmission using fractal and 2D-chaotic map
Chaudhary et al. Secure image encryption using chaotic, hybrid chaotic and block cipher approach
Mfungo et al. Enhancing image encryption with the Kronecker Xor product, the Hill Cipher, and the Sigmoid Logistic Map
Daoui et al. Efficient image encryption scheme using novel 1D multiparametric dynamical tent map and parallel computing
Sun et al. Image encryption scheme with compressed sensing based on a new six-dimensional non-degenerate discrete hyperchaotic system and plaintext-related scrambling
Mfungo et al. A novel image encryption scheme using chaotic maps and fuzzy numbers for secure transmission of information
Lone et al. Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher
Agarwal A new composite fractal function and its application in image encryption
Mfungo et al. Fractal-based hybrid cryptosystem: Enhancing image encryption with RSA, homomorphic encryption, and chaotic maps
Neamah et al. A novel conservative chaotic system involved in hyperbolic functions and its application to design an efficient colour image encryption scheme
Hazzazi et al. A novel cipher-based data encryption with galois field theory
Mohamed et al. Mixed multi-chaos quantum image encryption scheme based on quantum cellular automata (qca)
Song et al. Quantum color image encryption scheme based on geometric transformation and intensity channel diffusion