Cryptanalysis of DRPE using complex S-Box based on linear canonical transform

نویسندگان

چکیده

During recent decades, double random phase encoding grasped more attention for researchers. To achieve nonlinearity, it had been done with S-Box. We exhibit this involvement that DRPE system is much vulnerable in the above methodology. Concatenating anything needs an imaginary value, wherein S-Box unsuccessful it. Used has reformed into various sizes. Due to scenario, values are replicating. So, complex employed and proposed size of similar input image. Numerical simulations such as performance analysis, histogram analysis 3D plot have performed out validate practicability trustworthiness traditional Moreover, order check cryptanalysis, other occlusion attack, noise chosen plaintext sensitivity also accomplished.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

K-Complex Detection Based on Synchrosqueezing Transform

K-complex is an underlying pattern in the sleep EEG. Due to the role of sleep studies inneurophysiologic and cognitive disorders diagnosis, reliable methods for analysis and detection of this patternare of great importance. In our previous work, Synchrosqueezing Transform (SST) was proposed for analysisof this pattern. SST is an EMD-like tool, which benefits from wavelet transform and reallocat...

متن کامل

Digital computation of the complex linear canonical transform.

An efficient algorithm for the accurate computation of the linear canonical transform with complex transform parameters and with complex output variable is presented. Sampling issues are discussed and the requirements for different cases given. Simulations are provided to validate the results.

متن کامل

Provably Secure S-Box Implementation Based on Fourier Transform

Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric cryptographic implementations against DPA is to use masking techniques. However, clever masking of non-linear parts such as S-Boxes is difficult and has been the flaw of many countermeasures. In this article, we take ...

متن کامل

Sampling Rate Conversion in the Discrete Linear Canonical Transform Domain

Sampling rate conversion (SRC) is one of important issues in modern sampling theory. It can be realized by up-sampling, filtering, and down-sampling operations, which need large complexity. Although some efficient algorithms have been presented to do the sampling rate conversion, they all need to compute the N-point original signal to obtain the up-sampling or the down-sampling signal in the tim...

متن کامل

Eigenfunctions of linear canonical transform

The linear canonical transform (the LCT) is a useful tool for optical system analysis and signal processing. It is parameterized by a 2 2 matrix . Many operations, such as the Fourier transform (FT), fractional Fourier transform (FRFT), Fresnel transform, and scaling operations are all the special cases of the LCT. In this paper, we will discuss the eigenfunctions of the LCT. The eigenfunctions...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Multimedia Tools and Applications

سال: 2022

ISSN: ['1380-7501', '1573-7721']

DOI: https://doi.org/10.1007/s11042-022-13752-9