Chaos-Based Cryptography: Text Encryption Using Image Algorithms

نویسندگان

چکیده

Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encryption algorithms, e.g., textual data, are now rarely considered. This article studies how image-encryption algorithms can be used to encrypt text. The proposed approach this problem consists of two stages: in the first stage, text message intended for encryption into an image; second step, selected algorithm used. An example illustrates efficiency method. In addition, presents measures analysis that confirm security obtained cipher-image, such as entropy (value close 8), correlation adjacent pixels (values 0), or related differential cryptanalysis. method offers a new look at using chaos, by applying already known from literature.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review: Image Encryption Using Chaos Based algorithms

Due to the development in the field of network technology and multimedia applications, every minute thousands of messages which can be text, images, audios, videos are created and transmitted over wireless network. Improper delivery of the message may leads to the leakage of important information. So encryption is used to provide security. In last few years, variety of image encryption algorith...

متن کامل

Chaos-Based Image Encryption Algorithm Using Decomposition

In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: decomposition, shuffle, diffusion and combination. Decomposition is that an original image is decomposed to components by some rule. Shuffle and diffusion are the essential processions of image encryption. The purpose of the shuffle is to mask original organization of the pixels in images and diffu...

متن کامل

Two Novel Chaos-Based Algorithms for Image and Video Watermarking

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

متن کامل

Image retrieval using the combination of text-based and content-based algorithms

Image retrieval is an important research field which has received great attention in the last decades. In this paper, we present an approach for the image retrieval based on the combination of text-based and content-based features. For text-based features, keywords and for content-based features, color and texture features have been used. Query in this system contains some keywords and an input...

متن کامل

Chaos-Based Cryptography - Theory, Algorithms and Applications

Bargaining with reading habit is no need. Reading is not kind of something sold that you can take or not. It is a thing that will change your life to life better. It is the thing that will give you many things around the world and this universe, in the real world and here after. As what will be given by this chaos based cryptography theory algorithms and applications, how can you bargain with t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11193156