Proceedings ArticleDOI
Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback
M. Asim,Varun Jeoti +1 more
- pp 736-741
TLDR
The proposed image encryption scheme is less computationally intensive and far excels in security compared to the representative multimedia encryption schemes, and is shown to be secure against differential and linear cryptanalysis.Abstract:
Multimedia security has become serious issue due to prevalence of multimedia technology and, at the same time, rapid progress and wide acceptance of Internet in our society today. In this paper an image encryption scheme is proposed based on generalized logistic map, AES S-box, ciphertext feedback, piecewise linear chaotic maps. The cryptosystem is based on AES S-box, generalized logistic map and ciphertext feedback. A bank of piecewise linear chaotic maps is used to extract the secret chaotic key stream that is used for masking purpose. The proposed image encryption scheme is less computationally intensive. At the same time, it far excels in security compared to the representative multimedia encryption schemes. The proposed scheme is shown to be secure against differential and linear cryptanalysis.read more
Citations
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
TL;DR: The proposed cryptographically strong S-box shows very low differential approximation probability as compared to other chaos-based S-boxes designed recently, while maintaining good cryptographic properties and high value of linear approximation probability.
Proceedings ArticleDOI
On secure OFDM system: Chaos based constellation scrambling
TL;DR: A security scheme at physical (PHY) layer is proposed by scrambling OFDM constellation symbols to encrypt data transmission to resist against malicious attacks in 802.11i design.
Journal ArticleDOI
Computationally efficient selective video encryption with chaos based block cipher
TL;DR: The security issue is addressed by carefully selecting the substitution boxes for the block cipher in use, and it is shown that the compression efficiency and format compliance was not compromised while keeping the computational load at minimum.
Proceedings ArticleDOI
Chaos based constellation scrambling in OFDM systems: Security & interleaving issues
TL;DR: An efficient technique to introduce security at physical (PHY) layer is proposed in 802.11i design by scrambling OFDM constellation symbols to encrypt data transmission to resist against these malicious attacks.
References
More filters
Book ChapterDOI
Linear cryptanalysis method for DES cipher
TL;DR: A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations.
Journal ArticleDOI
Differential cryptanalysis of DES-like cryptosystems
Eli Biham,Adi Shamir +1 more
TL;DR: A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI
A symmetric image encryption scheme based on 3D chaotic cat maps
TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI
Image encryption using chaotic logistic map
TL;DR: The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.
Related Papers (5)
A novel algorithm for image encryption based on mixture of chaotic maps
An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box
Qing Lu,Congxu Zhu,Xiaoheng Deng +2 more