scispace - formally typeset
Open AccessJournal ArticleDOI

Security analysis and enhancements of an image cryptosystem based on hyperchaotic system

TLDR
Security enhancements are suggested and an enhanced cryptosystem is proposed to make it completely resistive against above and other types of cryptanalytic attacks and increase on its plain image sensitivity and statistical encryption strength.
About
This article is published in Journal of King Saud University - Computer and Information Sciences.The article was published on 2021-01-01 and is currently open access. It has received 37 citations till now. The article focuses on the topics: Cryptosystem & Ciphertext.

read more

Citations
More filters
Journal ArticleDOI

Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application

TL;DR: The use of the bifurcation diagram and Lyapunov exponent analysis showed that the proposed chaos game has the dynamical behavior, and fully chaotic characteristic, and can be used as a secure PRNG in cryptography systems.
Journal ArticleDOI

Implementation and practical problems of chaos-based cryptography revisited

TL;DR: This paper highlights some of the problems which deter the practical application of chaos-based cryptosystems, and discusses a number of possible solutions that can be explored to overcome these problems.
Journal ArticleDOI

An image encryption algorithm based on new generalized fusion fractal structure

TL;DR: In this paper , a generalized fusion fractal structure is proposed by combining two one-dimensional fractals as seed functions from a larger spectrum of fractal functions, and a novel image encryption algorithm based on the new fractal function is proposed which utilizes a generated pseudo-random number (PRN) sequence as secret key.
Journal ArticleDOI

Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems

TL;DR: A new hybridization of data encryption model to shelter the diagnosis data in medical images and prevent attacks is introduced, using an Adaptive Genetic Algorithm for Optimal Pixel Adjustment Process that enriches data hiding ability as well as imperceptibility features.
References
More filters
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Journal ArticleDOI

A chaos-based symmetric image encryption scheme using a bit-level permutation

TL;DR: This work proposes an image cryptosystem employing the Arnold cat map for bit-level permutation and the logistic map for diffusion, demonstrating the superior security and high efficiency of this algorithm.
Journal ArticleDOI

A new chaos-based fast image encryption algorithm

TL;DR: A fast image encryption algorithm with combined permutation and diffusion is proposed and an efficient method for generating pseudorandom numbers from spatiotemporal chaos is suggested, which further increases the encryption speed.
Journal ArticleDOI

Color image encryption using spatial bit-level permutation and high-dimension chaotic system

TL;DR: A bit-level permutation and high-dimension chaotic map to encrypt color image and security analysis show that the scheme can achieve good encryption result, but also that the key space is large enough to resist against common attack.
Journal ArticleDOI

A novel chaos-based image encryption algorithm using DNA sequence operations

TL;DR: Experimental results and security analyses both confirm that the proposed algorithm has not only an excellent encryption result but also resists various typical attacks.
Related Papers (5)