scispace - formally typeset
Proceedings ArticleDOI

Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback

M. Asim, +1 more
- pp 736-741
TLDR
The proposed image encryption scheme is less computationally intensive and far excels in security compared to the representative multimedia encryption schemes, and is shown to be secure against differential and linear cryptanalysis.
Abstract
Multimedia security has become serious issue due to prevalence of multimedia technology and, at the same time, rapid progress and wide acceptance of Internet in our society today. In this paper an image encryption scheme is proposed based on generalized logistic map, AES S-box, ciphertext feedback, piecewise linear chaotic maps. The cryptosystem is based on AES S-box, generalized logistic map and ciphertext feedback. A bank of piecewise linear chaotic maps is used to extract the secret chaotic key stream that is used for masking purpose. The proposed image encryption scheme is less computationally intensive. At the same time, it far excels in security compared to the representative multimedia encryption schemes. The proposed scheme is shown to be secure against differential and linear cryptanalysis.

read more

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)

TL;DR: The proposed cryptographically strong S-box shows very low differential approximation probability as compared to other chaos-based S-boxes designed recently, while maintaining good cryptographic properties and high value of linear approximation probability.
Proceedings ArticleDOI

On secure OFDM system: Chaos based constellation scrambling

TL;DR: A security scheme at physical (PHY) layer is proposed by scrambling OFDM constellation symbols to encrypt data transmission to resist against malicious attacks in 802.11i design.
Journal ArticleDOI

Computationally efficient selective video encryption with chaos based block cipher

TL;DR: The security issue is addressed by carefully selecting the substitution boxes for the block cipher in use, and it is shown that the compression efficiency and format compliance was not compromised while keeping the computational load at minimum.
Proceedings ArticleDOI

Chaos based constellation scrambling in OFDM systems: Security & interleaving issues

TL;DR: An efficient technique to introduce security at physical (PHY) layer is proposed in 802.11i design by scrambling OFDM constellation symbols to encrypt data transmission to resist against these malicious attacks.
References
More filters
Book ChapterDOI

Linear cryptanalysis method for DES cipher

TL;DR: A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations.
Journal ArticleDOI

Differential cryptanalysis of DES-like cryptosystems

TL;DR: A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

A symmetric image encryption scheme based on 3D chaotic cat maps

TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI

Image encryption using chaotic logistic map

TL;DR: The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.
Related Papers (5)