An Image Encryption Scheme Synchronizing Optimized Chaotic Systems Implemented on Raspberry Pis
نویسندگان
چکیده
Guaranteeing security in information exchange is a challenge public networks, such as the highly popular application layer Message Queue Telemetry Transport (MQTT) protocol. On one hand, chaos generators have shown their usefulness masking data that can be recovered while having appropriate binary string. Privacy then accomplished by implementing synchronization techniques to connect transmitter and receiver, among millions of users, encrypt decrypt correct key. other chaotic sequences generated on Rapsberry Pis connected over MQTT. To provide privacy security, receiver (among devices) synchronized same key data. In this manner, paper shows implementation optimized Raspberry are wirelessly via MQTT for IoT The publisher encrypts interconnected devices, but decrypted subscribers sequence. image encryption system tested performing NIST, TestU01, NPCR, UACI statistical analyses.
منابع مشابه
An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems
This paper puts forward a novel image encryption scheme based on ordinary differential equation system. Firstly, a hyper-chaotic differential equation system is used to generate two hyper-chaotic orbit sequences. Introducing the idea of hybrid orbit, two orbits are mixed to generate a hybrid hyper-chaotic sequence which is used to be the initial chaotic key stream. Secondly, the final encryptio...
متن کاملAn Improved Image Encryption Scheme Using Chaotic Logistic Maps
Chaos theory has significantly contributed towards the development of fast and secure image encryption algorithms. Authors in [1] proposed an efficient and secure approach for image encryption based on chaotic logistic maps. The algorithm uses an 80-bit secret key and two chaotic logistic maps, whose initial conditions are derived using the secret key. Depending upon the outcome of logistic map...
متن کاملOn the cryptanalysis of Fridrich's chaotic image encryption scheme
Utilizing complex dynamics of chaotic maps and systems in encryption was studied comprehensively in the past two and a half decades. In 1989, Fridrich’s chaotic image encryption scheme was designed by iterating chaotic position permutation and value substitution some rounds, which received intensive attention in the field of chaos-based cryptography. In 2010, Solak et al. proposed a chosen-ciph...
متن کاملA Fast Image Encryption Scheme based on Chaotic Standard Map
In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a ce...
متن کاملCryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map
With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2022
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math10111907