New Compression–Encryption Algorithm Using Chaos-Based Dynamic Session Key
نویسندگان
چکیده
منابع مشابه
A chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملVoltage profile improvement through online dynamic voltage restorer controlled by chaos-based genetic algorithm
Improving reliability indices, increasing the grid production capacity, reducing power loss during peak periods and fuel cost, and economic and environmental considerations on the one hand, and the progresses made in the field of semiconductor devices on the other hand, are some of the factors that increase the penetration of the renewable energy sources to the distributed network. When the pho...
متن کاملA New Chaos-Based Image Encryption Algorithm
In this paper, we propose a new image encryption algorithm based on the Compound chaotic image encryption algorithm. The original one can’t resist chosen-plaintext attack and has weak statistical security, but our new algorithm can resist the chosen-plaintext attack using a simple improvement solution. The improvement solution is novel and transplantable, it can also be used to enhance the abil...
متن کاملDynamic Session Key Exchange Method using Two S-Boxes
This paper presents modifications of the Diffie-Hellman (DH) key exchange method. The presented modifications provide better security than other key exchange methods. We are going to present a dynamic security that simultaneously realizes all the three functions with a high efficiency and then give a security analysis. It also presents secure and dynamic key exchange method. Signature, encrypti...
متن کاملChaos-Based Image Encryption Algorithm Using Decomposition
In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: decomposition, shuffle, diffusion and combination. Decomposition is that an original image is decomposed to components by some rule. Shuffle and diffusion are the essential processions of image encryption. The purpose of the shuffle is to mask original organization of the pixels in images and diffu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Smart Sensing and Intelligent Systems
سال: 2018
ISSN: 1178-5608
DOI: 10.21307/ijssis-2018-004