A chaotic image encryption scheme owning temp-value feedback

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A chaotic image encryption scheme owning temp-value feedback

Many round-based chaotic image encryption algorithms employ the permutation-diffusion structure. Schemes using this structure have been found insecure when the iteration round is equal to one and the secret permutation of some existing ones can be recovered even a higher iteration round is adopted. In this paper, we present a single round permutation-diffusion chaotic cipher for gray image, in ...

متن کامل

A Fast Image Encryption Scheme based on Chaotic Standard Map

In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a ce...

متن کامل

A Highly Secure Image Encryption Scheme using Compound Chaotic Maps

During the last two decades various chaotic image encryption algorithms have been proposed, but most of them encountered some defects like small key space, low speed, lack of robustness and weak security. This paper proposes a chaos-based image encryption scheme with a permutation–diffusion mechanism, where six skew tent maps and one sixdimensional Arnold map are utilized to generate one hybrid...

متن کامل

On the cryptanalysis of Fridrich's chaotic image encryption scheme

Utilizing complex dynamics of chaotic maps and systems in encryption was studied comprehensively in the past two and a half decades. In 1989, Fridrich’s chaotic image encryption scheme was designed by iterating chaotic position permutation and value substitution some rounds, which received intensive attention in the field of chaos-based cryptography. In 2010, Solak et al. proposed a chosen-ciph...

متن کامل

Improved Cryptanalysis of CMC Chaotic Image Encryption Scheme

Recently, chaos has attracted much attention in the field of cryptography. To study the security with a known image of a symmetric image encryption scheme, the attack algorithm of equivalent key is given. We give the known image attacks under different other conditions to obtain the equivalent key. The concrete step and complexity of the attack algorithm is given. So the symmetric image encrypt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications in Nonlinear Science and Numerical Simulation

سال: 2014

ISSN: 1007-5704

DOI: 10.1016/j.cnsns.2014.03.016