Cryptosystem Based On 2-D Chaotic Maps

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

An Efficient Medical Image Cryptosystem Based on Chaotic Maps

With the growing applications of digital images in medical health system and the development of computer networks, medical image encryption has become an important technology to protect patients’ privacy when it is transmitted over open networks. Recently, chaos-based encryption approaches have been proven to be more effective for image encryption than other traditional methods (e.g. IDEA and A...

متن کامل

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

A New Chaotic Cryptosystem Based on Multiple One-dimensional Chaotic Maps

In this paper, the authors propose a new chaotic block cryptosystem based on multiple one-dimensional chaotic maps. In the proposed cryptosystem, the authors establish map-to-task relations between the multiple chaotic maps and the tasks, which must be performed in the encryption rounds. The encryption process is based on these map-to-task relations. The authors enhance the security of the cryp...

متن کامل

Chaotic Cryptosystem based on Inverse Duffing Circuit

We have studied experimentally a chaotic cryptosystem, which is based on the inverse system approach. We applied this method to a second order nonlinear circuit (master circuit), which is described by a Duffing equation. We present the implementation of the slave circuit with the inverse system approach and we demonstrate the decryption when the information signal has several forms (sinusoidal ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The International Conference on Electrical Engineering

سال: 2006

ISSN: 2636-4441

DOI: 10.21608/iceeng.2006.33680