New Compression–Encryption Algorithm Using Chaos-Based Dynamic Session Key

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A chaos-based video watermarking algorithm

The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...

متن کامل

Voltage profile improvement through online dynamic voltage restorer controlled by chaos-based genetic algorithm

Improving reliability indices, increasing the grid production capacity, reducing power loss during peak periods and fuel cost, and economic and environmental considerations on the one hand, and the progresses made in the field of semiconductor devices on the other hand, are some of the factors that increase the penetration of the renewable energy sources to the distributed network. When the pho...

متن کامل

A New Chaos-Based Image Encryption Algorithm

In this paper, we propose a new image encryption algorithm based on the Compound chaotic image encryption algorithm. The original one can’t resist chosen-plaintext attack and has weak statistical security, but our new algorithm can resist the chosen-plaintext attack using a simple improvement solution. The improvement solution is novel and transplantable, it can also be used to enhance the abil...

متن کامل

Dynamic Session Key Exchange Method using Two S-Boxes

This paper presents modifications of the Diffie-Hellman (DH) key exchange method. The presented modifications provide better security than other key exchange methods. We are going to present a dynamic security that simultaneously realizes all the three functions with a high efficiency and then give a security analysis. It also presents secure and dynamic key exchange method. Signature, encrypti...

متن کامل

Chaos-Based Image Encryption Algorithm Using Decomposition

In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: decomposition, shuffle, diffusion and combination. Decomposition is that an original image is decomposed to components by some rule. Shuffle and diffusion are the essential processions of image encryption. The purpose of the shuffle is to mask original organization of the pixels in images and diffu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Smart Sensing and Intelligent Systems

سال: 2018

ISSN: 1178-5608

DOI: 10.21307/ijssis-2018-004