Chaotic Image Scrambling Algorithm Based on S-DES

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaotic Image Scrambling Algorithm Based on S-DES

With the security requirement improvement of the image on the network, some typical image encryption methods can’t meet the demands of encryption, such as Arnold cat map and Hilbert transformation. S-DES system can encrypt the input binary flow of image, but the fixed system structure and few keys will still bring some risks. However, the sensitivity of initial value that Logistic chaotic map c...

متن کامل

Analysis and Improvement of Encryption Algorithm Based on Blocked and Chaotic Image Scrambling

Based on blocked image scrambling encryption, this study presents a new image encryption algorithm by introducing chaos theory. This algorithm firstly makes spatial scrambling based on image blocking in order to interrupt pixel position, then furthering this interruption through Arnold Mapping in the chaos and transforms pixel RGB color space through optimized Arnold Mapping. After this process...

متن کامل

Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values

Based on chaotic sequence and decomposition and recombination of pixel values, a new digital image scrambling algorithm is proposed in the paper. While scrambling image pixel values, this new algorithm is able to change the spatial position of pixel, simultaneously scrambling both position and pixel values. Experiments show that the new algorithm is larger in key space, highly efficient, sensit...

متن کامل

Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation

This paper proposed a novel image scrambling scheme based on chaos theory and the sorting transformation. The new algorithm calculates the permuting address codes by sorting the chaotic sequence, not like common method by quantizing the chaotic sequence. Therefore, the new scheme does not require knowing the probability density function of the chaotic orbits in advance, thus not only facilitati...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2006

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/48/1/065