منابع مشابه
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
An Efficient Medical Image Cryptosystem Based on Chaotic Maps
With the growing applications of digital images in medical health system and the development of computer networks, medical image encryption has become an important technology to protect patients’ privacy when it is transmitted over open networks. Recently, chaos-based encryption approaches have been proven to be more effective for image encryption than other traditional methods (e.g. IDEA and A...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملA New Chaotic Cryptosystem Based on Multiple One-dimensional Chaotic Maps
In this paper, the authors propose a new chaotic block cryptosystem based on multiple one-dimensional chaotic maps. In the proposed cryptosystem, the authors establish map-to-task relations between the multiple chaotic maps and the tasks, which must be performed in the encryption rounds. The encryption process is based on these map-to-task relations. The authors enhance the security of the cryp...
متن کاملChaotic Cryptosystem based on Inverse Duffing Circuit
We have studied experimentally a chaotic cryptosystem, which is based on the inverse system approach. We applied this method to a second order nonlinear circuit (master circuit), which is described by a Duffing equation. We present the implementation of the slave circuit with the inverse system approach and we demonstrate the decryption when the information signal has several forms (sinusoidal ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The International Conference on Electrical Engineering
سال: 2006
ISSN: 2636-4441
DOI: 10.21608/iceeng.2006.33680