Agarwal, 2020 - Google Patents
A new composite fractal function and its application in image encryptionAgarwal, 2020
View HTML- Document ID
- 16786413064391715494
- Author
- Agarwal S
- Publication year
- Publication venue
- Journal of imaging
External Links
Snippet
Fractal's spatially nonuniform phenomena and chaotic nature highlight the function utilization in fractal cryptographic applications. This paper proposes a new composite fractal function (CFF) that combines two different Mandelbrot set (MS) functions with one control …
- 239000002131 composite material 0 title abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Masood et al. | A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map | |
Feng et al. | Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform | |
Ramasamy et al. | An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map | |
Zhang et al. | Chaos-based image encryption: Review, application, and challenges | |
Chowdhary et al. | Analytical study of hybrid techniques for image encryption and decryption | |
Alexan et al. | Rgb image encryption through cellular automata, s-box and the lorenz system | |
Alghamdi et al. | A lightweight image encryption algorithm based on chaotic map and random substitution | |
Murillo-Escobar et al. | Suggested integral analysis for chaos-based image cryptosystems | |
Khairullah et al. | Designing 1D chaotic maps for fast chaotic image encryption | |
Huang et al. | A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion | |
El-Latif et al. | Efficient chaos-based substitution-box and its application to image encryption | |
Alghamdi et al. | Image encryption algorithms: a survey of design and evaluation metrics | |
Agarwal | Secure image transmission using fractal and 2D-chaotic map | |
Chaudhary et al. | Secure image encryption using chaotic, hybrid chaotic and block cipher approach | |
Mfungo et al. | Enhancing image encryption with the Kronecker Xor product, the Hill Cipher, and the Sigmoid Logistic Map | |
Daoui et al. | Efficient image encryption scheme using novel 1D multiparametric dynamical tent map and parallel computing | |
Sun et al. | Image encryption scheme with compressed sensing based on a new six-dimensional non-degenerate discrete hyperchaotic system and plaintext-related scrambling | |
Mfungo et al. | A novel image encryption scheme using chaotic maps and fuzzy numbers for secure transmission of information | |
Lone et al. | Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher | |
Agarwal | A new composite fractal function and its application in image encryption | |
Mfungo et al. | Fractal-based hybrid cryptosystem: Enhancing image encryption with RSA, homomorphic encryption, and chaotic maps | |
Neamah et al. | A novel conservative chaotic system involved in hyperbolic functions and its application to design an efficient colour image encryption scheme | |
Hazzazi et al. | A novel cipher-based data encryption with galois field theory | |
Mohamed et al. | Mixed multi-chaos quantum image encryption scheme based on quantum cellular automata (qca) | |
Song et al. | Quantum color image encryption scheme based on geometric transformation and intensity channel diffusion |