A chaotic image encryption scheme owning temp-value feedback
نویسندگان
چکیده
منابع مشابه
A chaotic image encryption scheme owning temp-value feedback
Many round-based chaotic image encryption algorithms employ the permutation-diffusion structure. Schemes using this structure have been found insecure when the iteration round is equal to one and the secret permutation of some existing ones can be recovered even a higher iteration round is adopted. In this paper, we present a single round permutation-diffusion chaotic cipher for gray image, in ...
متن کاملA Fast Image Encryption Scheme based on Chaotic Standard Map
In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a ce...
متن کاملA Highly Secure Image Encryption Scheme using Compound Chaotic Maps
During the last two decades various chaotic image encryption algorithms have been proposed, but most of them encountered some defects like small key space, low speed, lack of robustness and weak security. This paper proposes a chaos-based image encryption scheme with a permutation–diffusion mechanism, where six skew tent maps and one sixdimensional Arnold map are utilized to generate one hybrid...
متن کاملOn the cryptanalysis of Fridrich's chaotic image encryption scheme
Utilizing complex dynamics of chaotic maps and systems in encryption was studied comprehensively in the past two and a half decades. In 1989, Fridrich’s chaotic image encryption scheme was designed by iterating chaotic position permutation and value substitution some rounds, which received intensive attention in the field of chaos-based cryptography. In 2010, Solak et al. proposed a chosen-ciph...
متن کاملImproved Cryptanalysis of CMC Chaotic Image Encryption Scheme
Recently, chaos has attracted much attention in the field of cryptography. To study the security with a known image of a symmetric image encryption scheme, the attack algorithm of equivalent key is given. We give the known image attacks under different other conditions to obtain the equivalent key. The concrete step and complexity of the attack algorithm is given. So the symmetric image encrypt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications in Nonlinear Science and Numerical Simulation
سال: 2014
ISSN: 1007-5704
DOI: 10.1016/j.cnsns.2014.03.016