SECURED INFORMATION USING HYPER-CHAOS ENCRYPTION ALGORITHM
نویسندگان
چکیده
منابع مشابه
Securing the Information Using Hyper-chaos Encryption Algorithm
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all...
متن کاملImprovement of an image encryption algorithm based on hyper-chaos
In this paper, we propose to enhance a recently proposed image cryptosystem based on hyper-chaos. The updated version has been builded to resist against attacks made to break the original one and to make it faster. The modification touch on the two Boxes, P-Box and S-Box, which composed the original cryptosystem. Compared with classical encryption scheme, AES and Triple-DES, the new version of ...
متن کاملA new image encryption algorithm based on hyper-chaos
This Letter presents a new image encryption scheme, which employs an image total shuffling matrix to shuffle the positions of image pixels and then uses a hyper-chaotic system to confuse the relationship between the plain-image and the cipher-image. The experimental results demonstrate that the suggested encryption algorithm of image has the advantages of large key space and high security, and ...
متن کاملChaos-Based Image Encryption Algorithm Using Decomposition
In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: decomposition, shuffle, diffusion and combination. Decomposition is that an original image is decomposed to components by some rule. Shuffle and diffusion are the essential processions of image encryption. The purpose of the shuffle is to mask original organization of the pixels in images and diffu...
متن کاملEncryption using Deterministic Chaos
The concepts of randomness, unpredictability, complexity and entropy form the basis of modern cryptography and a cryptosystem can be interpreted as the design of a key-dependent bijective transformation that is unpredictable to an observer for a given computational resource. For any cryptosystem, including a Pseudo-Random Number Generator (PRNG), encryption algorithm or a key exchange scheme, f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Information Sciences and Computing
سال: 2012
ISSN: 0973-9092
DOI: 10.18000/ijisac.50122