Chaotic Image Scrambling Algorithm Based on S-DES
نویسندگان
چکیده
منابع مشابه
Chaotic Image Scrambling Algorithm Based on S-DES
With the security requirement improvement of the image on the network, some typical image encryption methods can’t meet the demands of encryption, such as Arnold cat map and Hilbert transformation. S-DES system can encrypt the input binary flow of image, but the fixed system structure and few keys will still bring some risks. However, the sensitivity of initial value that Logistic chaotic map c...
متن کاملAnalysis and Improvement of Encryption Algorithm Based on Blocked and Chaotic Image Scrambling
Based on blocked image scrambling encryption, this study presents a new image encryption algorithm by introducing chaos theory. This algorithm firstly makes spatial scrambling based on image blocking in order to interrupt pixel position, then furthering this interruption through Arnold Mapping in the chaos and transforms pixel RGB color space through optimized Arnold Mapping. After this process...
متن کاملDigital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values
Based on chaotic sequence and decomposition and recombination of pixel values, a new digital image scrambling algorithm is proposed in the paper. While scrambling image pixel values, this new algorithm is able to change the spatial position of pixel, simultaneously scrambling both position and pixel values. Experiments show that the new algorithm is larger in key space, highly efficient, sensit...
متن کاملImage Scrambling Algorithm Based on Chaos Theory and Sorting Transformation
This paper proposed a novel image scrambling scheme based on chaos theory and the sorting transformation. The new algorithm calculates the permuting address codes by sorting the chaotic sequence, not like common method by quantizing the chaotic sequence. Therefore, the new scheme does not require knowing the probability density function of the chaotic orbits in advance, thus not only facilitati...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2006
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/48/1/065