Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map

نویسندگان

چکیده

With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts data. The concerns this domain are security and privacy. Therefore, attaining reliable level confidentiality environment is pivotal task. Among different types data stored fog, 3D point mesh increasingly popular recent days, due to growth modelling printing technologies. Hence, research, we propose novel scheme for preserving privacy Chaotic Cat map-based encryption recently trending research area its unique properties like pseudo-randomness, deterministic nature, sensitivity initial conditions, ergodicity, etc. To boost efficiency significantly, work, map. sequence generated by map used transform coordinates improved range proposed depicted using bifurcation analysis. quality also analyzed metrics Lyapunov exponent approximate entropy. We demonstrate performance framework attacks brute-force attack statistical attack. experimental results clearly depict that produces best compared previous works literature.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Chaotic Image Encryption Using 1D Logistic Map, 2D Arnold Cat Map and 3D Arnold Cat Map

Analyzing the randomness, complexity and efficiency of chaotic image encryption using 1D Logistic map, 2D Arnold cat map or 3D Arnold cat map is proposed here. The keys for the encryption process are generated from the biometric image of the sender. Initially the biometric fingerprint image of the sender is captured using a scanner, which is preprocessed to the grey level image. By using an eff...

متن کامل

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

With the advancement of multimedia and real-time networks, a vast number of digital images are now stored and transmitted over public networks. A lot of researches of chaos-based image encryption technologies have been done. However, the performance of conventional encryption algorithm is not satisfying when used to color image. In this paper, we propose an improved chaos-based color image cryp...

متن کامل

Review on 3D Chaotic Map Encryption and Data Hiding Technique

Transmission of important data like text, images, video, etc over the internet is increases now days, hence it’s necessary to use of secure methods for multimedia data. Image encryption is most secure than other multimedia components encryption because some inherent properties, such as huge data capacity and high correlation between pixels. The older encryption techniques such as AES, DES, RTS ...

متن کامل

A novel parallel hash function based on 3D chaotic map

As the core of cryptography, hash function is one of the basic techniques for information security. During the last few years, considerable effort has been devoted to research on chaos-based hash functions. Nevertheless, the corresponding analysis of them lag far behind. In this paper, a new efficient scheme for parallel hash function based on high-dimensional chaotic map is proposed. In the pr...

متن کامل

Improving Image Encryption Using 3D Cat Map and Turing Machine

Security of data is of prime importance. Security is a very complex and vast topic. One of the common ways to protect this digital data from unauthorized eavesdropping is encryption. This paper introduces an improved image encryption technique based on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The algorithm consists of two main sections: The first d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2023

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2023.030648