Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map
نویسندگان
چکیده
With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts data. The concerns this domain are security and privacy. Therefore, attaining reliable level confidentiality environment is pivotal task. Among different types data stored fog, 3D point mesh increasingly popular recent days, due to growth modelling printing technologies. Hence, research, we propose novel scheme for preserving privacy Chaotic Cat map-based encryption recently trending research area its unique properties like pseudo-randomness, deterministic nature, sensitivity initial conditions, ergodicity, etc. To boost efficiency significantly, work, map. sequence generated by map used transform coordinates improved range proposed depicted using bifurcation analysis. quality also analyzed metrics Lyapunov exponent approximate entropy. We demonstrate performance framework attacks brute-force attack statistical attack. experimental results clearly depict that produces best compared previous works literature.
منابع مشابه
Analysis of Chaotic Image Encryption Using 1D Logistic Map, 2D Arnold Cat Map and 3D Arnold Cat Map
Analyzing the randomness, complexity and efficiency of chaotic image encryption using 1D Logistic map, 2D Arnold cat map or 3D Arnold cat map is proposed here. The keys for the encryption process are generated from the biometric image of the sender. Initially the biometric fingerprint image of the sender is captured using a scanner, which is preprocessed to the grey level image. By using an eff...
متن کاملA Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map
With the advancement of multimedia and real-time networks, a vast number of digital images are now stored and transmitted over public networks. A lot of researches of chaos-based image encryption technologies have been done. However, the performance of conventional encryption algorithm is not satisfying when used to color image. In this paper, we propose an improved chaos-based color image cryp...
متن کاملReview on 3D Chaotic Map Encryption and Data Hiding Technique
Transmission of important data like text, images, video, etc over the internet is increases now days, hence it’s necessary to use of secure methods for multimedia data. Image encryption is most secure than other multimedia components encryption because some inherent properties, such as huge data capacity and high correlation between pixels. The older encryption techniques such as AES, DES, RTS ...
متن کاملA novel parallel hash function based on 3D chaotic map
As the core of cryptography, hash function is one of the basic techniques for information security. During the last few years, considerable effort has been devoted to research on chaos-based hash functions. Nevertheless, the corresponding analysis of them lag far behind. In this paper, a new efficient scheme for parallel hash function based on high-dimensional chaotic map is proposed. In the pr...
متن کاملImproving Image Encryption Using 3D Cat Map and Turing Machine
Security of data is of prime importance. Security is a very complex and vast topic. One of the common ways to protect this digital data from unauthorized eavesdropping is encryption. This paper introduces an improved image encryption technique based on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The algorithm consists of two main sections: The first d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2023
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2023.030648