An Image Encryption Scheme Synchronizing Optimized Chaotic Systems Implemented on Raspberry Pis

نویسندگان

چکیده

Guaranteeing security in information exchange is a challenge public networks, such as the highly popular application layer Message Queue Telemetry Transport (MQTT) protocol. On one hand, chaos generators have shown their usefulness masking data that can be recovered while having appropriate binary string. Privacy then accomplished by implementing synchronization techniques to connect transmitter and receiver, among millions of users, encrypt decrypt correct key. other chaotic sequences generated on Rapsberry Pis connected over MQTT. To provide privacy security, receiver (among devices) synchronized same key data. In this manner, paper shows implementation optimized Raspberry are wirelessly via MQTT for IoT The publisher encrypts interconnected devices, but decrypted subscribers sequence. image encryption system tested performing NIST, TestU01, NPCR, UACI statistical analyses.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

This paper puts forward a novel image encryption scheme based on ordinary differential equation system. Firstly, a hyper-chaotic differential equation system is used to generate two hyper-chaotic orbit sequences. Introducing the idea of hybrid orbit, two orbits are mixed to generate a hybrid hyper-chaotic sequence which is used to be the initial chaotic key stream. Secondly, the final encryptio...

متن کامل

An Improved Image Encryption Scheme Using Chaotic Logistic Maps

Chaos theory has significantly contributed towards the development of fast and secure image encryption algorithms. Authors in [1] proposed an efficient and secure approach for image encryption based on chaotic logistic maps. The algorithm uses an 80-bit secret key and two chaotic logistic maps, whose initial conditions are derived using the secret key. Depending upon the outcome of logistic map...

متن کامل

On the cryptanalysis of Fridrich's chaotic image encryption scheme

Utilizing complex dynamics of chaotic maps and systems in encryption was studied comprehensively in the past two and a half decades. In 1989, Fridrich’s chaotic image encryption scheme was designed by iterating chaotic position permutation and value substitution some rounds, which received intensive attention in the field of chaos-based cryptography. In 2010, Solak et al. proposed a chosen-ciph...

متن کامل

A Fast Image Encryption Scheme based on Chaotic Standard Map

In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a ce...

متن کامل

Cryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map

With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2022

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math10111907