Chaotic Multilevel Separated Encryption for Security Enhancement of OFDM-PON

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

Improving Security of a Chaotic Encryption Approach

E. Alvarez et al. presented a new chaotic encryption approach recently. But soon G. Alvarez et al. broke it with four cryptanalytic methods and found some other weaknesses. In this letter we point out why the original scheme is so vulnerable to the proposed four attacks. The chief reasons are two essential defects existing in the original scheme. Based on such a fact, we present an improved enc...

متن کامل

A New Method for Encryption of Color Images based on Combination of Chaotic Systems

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

متن کامل

Enhancement and Analysis of Chaotic Image Encryption Algorithms

The focus of this paper is to improve the level of security and secrecy provided by the chaotic map based image encryption.An encryption algorithm based on the Logistic and the Henon maps is proposed. The algorithm uses chaotic iteration to generate the encryption keys, and then carries out the XOR and cyclic shift operations on the plain text to change the values of image pixels. Chaotic Map L...

متن کامل

Steps towards improving the security of chaotic encryption.

We present a method in which a chaotic signal is used to mask a message securely. It depends on separating the two tasks of synchronizing the chaotic oscillators and encrypting the message. A sporadic drive together with a function f of the ciphertext and response system variables is used to make extraction difficult. We give a choice of f that makes the method similar to a one-time pad, with p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2019.2938910