Image Merger Encryptor: A Chaotic and Chebyshev Key Approach

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

With the advancement of multimedia and real-time networks, a vast number of digital images are now stored and transmitted over public networks. A lot of researches of chaos-based image encryption technologies have been done. However, the performance of conventional encryption algorithm is not satisfying when used to color image. In this paper, we propose an improved chaos-based color image cryp...

متن کامل

Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps

In 2014, Lin proposed an authentication system with dynamic identity of the user for low-power mobile devices using Chebyshev chaotic map. The scheme is proposed to provide mutual authentication and session key agreement between a remote server and its legitimate user. The scheme provides user anonymity and untracibility, and resilience from many cryptographic attacks. However, the author of th...

متن کامل

Three Factor Authenticated Key Agreement Scheme for Telecare Medicine Information System Using Chebyshev Chaotic Maps

Telecare Medicine Information System (TMIS) is an effective technology in which patients can remain at their home and can get suggestions for medical treatment through the internet. One of the challenges faced by this system is security of medical data. Hence mutual authentication and session key establishment on a medical server between doctor and a patient are required for enhancing security ...

متن کامل

Chaotic Image Encryption Based on Running-Key Related to Plaintext

In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the secu...

متن کامل

Symmetric key image encryption using chaotic Rossler system

In this article, an algorithm for encryption of digital image based on chaos theory is proposed. This encryption algorithm includes two main operations of image element shuffling and pixel replacement. The analysis of cryptographic strength (resistance attack) has been performed to confirm the fact. The results of several experimental tests, such as key space analysis, key sensitivity analysis,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Research Journal of Information Technology

سال: 2016

ISSN: 1815-7432

DOI: 10.3923/rjit.2016.10.16