As such, the application of chaos in modern cryptography has been a topic of much research and debate for over a decade. This paper presents an overview of chaotic dynamics and their role in symmetric key chaos-based cryptosystems from both a theoretical and practical perspective. It is argued...
基于混沌的 双语例句 1 Research on Chaos Based Image Encryption and Watermarking Technology 基于混沌的图像加密与数字水印技术研究
namedaschaos-basedmutation(CM)operator,ispro- posed.Moreover,theinformationofdiversityestimationis alsoadoptedintheCMoperatorfornondominatedsolu- tionstoadjustmutationstepsadaptively,whichencourages searchingless-crowdedregionswithrelativelargestep sizes.Whencomparingwithpolynomialmutationoperator ...
Security analysis, which is another process that needs to be performed regarding chaos-based image encryption, is also included in this chapter. In the literature, entropy, correlation, differential attack, histogram, keyspace analysis, which are the most widely used analysis methods for chaos-based...
Chaos-Based Cryptography Zhaopin Su, Shiguo Lian, Guofu Zhang& Jianguo Jiang Part of the book series:Studies in Computational Intelligence((SCI,volume 354)) 2445Accesses Introduction In recent years, with the development of network technology and multimedia technology, multimedia data, especially video...
Tools Share Cite Recommend Abstract This Letter contributes to the topic of chaos computing by introducing a new chaos-based implementation of sequential gates. In particular, the early results reported herein show that a chaos-based SR flip–flop can be obtained from two cross-coupled NOR gates ...
Zhang, J. Xu, Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Opt. Laser Technol. 127, 106171 (2020) Article Google Scholar S.K. Rajput, N.K. Nishchal, Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval ...
Chaos-based true random number generators. J.Math.Industry 7, 1 (2016). https://doi.org/10.1186/s13362-016-0026-4 Download citation Received28 January 2016 Accepted20 June 2016 Published29 June 2016 DOIhttps://doi.org/10.1186/s13362-016-0026-4 Share this article Anyone you share the ...
We present a numeric chaos-based cryptosystem, implemented on a Digital Signal Processor (DSP), which resists all the attacks we have thought of. The encryption scheme is a synchronous stream cipher. Its security arises from the properties of the trajectories in a chaotic attractor, reinforced by...
To achieve this, we propose a new chaos-based symmetric-key encryption technique for satellite imagery. This scheme utilizes multiple chaotic maps e.g. Logistic, Henon, Tent, Cubic, Sine and Chebyshev for enhancing the key space, robustness and security of satellite imagery. We perform key ...