Journal ArticleDOI
Chaos based video encryption using maps and Ikeda time delay system
D. Valli,K. Ganesan +1 more
Reads0
Chats0
TLDR
Two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme.Abstract:
Chaos based cryptosystems are an efficient method to deal with improved speed and highly secured multimedia encryption because of its elegant features, such as randomness, mixing, ergodicity, sensitivity to initial conditions and control parameters. In this paper, two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme. These encryption schemes employ a substitution box (S-box) to diffuse the relationship between pixels of plain video and cipher video along with the diffusion of current input pixel with the previous cipher pixel, called cipher block chaining (CBC). The proposed method enhances the robustness against statistical, differential and chosen/known plain text attacks. Detailed analysis is carried out in this paper to demonstrate the security and uniqueness of the proposed scheme.read more
Citations
More filters
Journal ArticleDOI
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario
Ahmed A. Abd El-Latif,Bassem Abd-El-Atty,Wojciech Mazurczyk,Carol Fung,Salvador E. Venegas-Andraca +4 more
TL;DR: The features of quantum walk are utilized to construct a new S-box method which plays a significant role in block cipher techniques for 5G-IoT technologies and a new robust video encryption mechanism is proposed.
Journal ArticleDOI
A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications
TL;DR: A novel hybrid cryptosystem combining DNA (Deoxyribonucleic Acid) sequences, Arnold chaotic map, and Mandelbrot sets is suggested for secure streaming of compressed HEVC streams, which reveals astonishing robustness and security accomplishment in contrast to the literature cryptosSystems.
Journal ArticleDOI
Implementation and practical problems of chaos-based cryptography revisited
TL;DR: This paper highlights some of the problems which deter the practical application of chaos-based cryptosystems, and discusses a number of possible solutions that can be explored to overcome these problems.
Journal ArticleDOI
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications.
TL;DR: This work proposes novel chaotic-based multimedia encryption schemes utilizing 2D alteration models for high secure data transmission and a novel perturbation-based data encryption for both confusion and diffusion rounds.
Journal ArticleDOI
Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps
Heping Wen,Simin Yu +1 more
TL;DR: Both theoretical analysis and experimental results demonstrate that IEC-BPMC is insecure against chosen-plaintext attack with low data complexity and computational complexity.
References
More filters
Journal ArticleDOI
A new 1D chaotic system for image encryption
TL;DR: Simulations and performance evaluations show that the proposed system is able to produce many 1D chaotic maps with larger chaotic ranges and better chaotic behaviors compared with their seed maps.
Journal ArticleDOI
Chaos and cryptography: block encryption ciphers based on chaotic maps
Goce Jakimoski,Ljupco Kocarev +1 more
TL;DR: Using the well-known principles in the cryptanalysis it is shown that these ciphers do not behave worse than the standard ones, opening in this way a novel approach to the design of block encryption cipher.
Journal ArticleDOI
A fast image encryption algorithm based on chaotic map
TL;DR: A new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity.
Journal ArticleDOI
High-dimensional chaotic behavior in systems with time-delayed feedback
K. Ikeda,K. Matsumoto +1 more
TL;DR: In this article, the Lyapunov analysis is used to study the high-dimensional chaotic states of a class of delay-differential equations with time delayed feedback such as nonlinear optical resonators.
Book
Chaos-based Cryptography: Theory, Algorithms and Applications
Ljupco Kocarev,Shiguo Lian +1 more
TL;DR: This chapter discusses the design and implementation of chaos based cipher: Design of embedded systems for security applications, and the lessons learnt from the cryptanalysis of chaos-based ciphers.
Related Papers (5)
An Improved Image Encryption Algorithm based on Chaotic System
Shubo Liu,Jing Sun,Zhengquan Xu +2 more