作者:
Man, ZhenlongLi, JinqingDi, XiaoqiangCUST
Sch Comp Sci & Technol Changchun 130022 Peoples R China CUST
Prov Key Lab Network & Informat Secur Changchun 130022 Peoples R China CUST
Informat Ctr Changchun 130022 Jilin Peoples R China
To mitigate the shortcomings of existing medical image encryption algorithms, including a lack of anti-tampering methods and security, this report presents an anti-tampering encryption algorithm for medical images tha...
详细信息
To mitigate the shortcomings of existing medical image encryption algorithms, including a lack of anti-tampering methods and security, this report presents an anti-tampering encryption algorithm for medical images that is based on a self-verification matrix. First, chaotic coordinates generated by chaos are used to traverse all pixels in a plain image to generate a two-dimensional matrix (a self-verification matrix) with positioning information. The accurate location of illegally altered image pixels can be detected using the self-verification matrix. To improve the security of the self-authentication matrix, DNA coding is also applied to the self-authentication matrix, and the plain image is also diffused statically to destroy the pixel distribution. Next, the scrambled image and self-verification matrix are mixed and cross-scrambled. Finally, the fused image is diffused dynamically to improve the security of the encrypted image. Experimental simulation and performance analysis show that the algorithm achieves good encryption effectiveness, provides strong anti-tampering capabilities, and can accurately locate at least 4 pixels.
This paper describes an encryption algorithm based on a polynomial system of residual classes. We study the FPGA bitstream implementation on the Xilinx and 16-nm UltraScale™ ASIC architecture which enables floating-po...
详细信息
ISBN:
(数字)9781728197135
ISBN:
(纸本)9781728197142
This paper describes an encryption algorithm based on a polynomial system of residual classes. We study the FPGA bitstream implementation on the Xilinx and 16-nm UltraScale™ ASIC architecture which enables floating-point operation, multi-processing, parallelism, pipelining, highperformance computing, etc. The software-based bitstream encryption and on-chip decryption are performed with the stored encryption key and encrypted bitstream, generated by a Vivado tool. The self-authenticating algorithms with a symmetric key are investigated. The encryption algorithms are implemented using the polynomial system of residual numbers. Data encryption in a residual number system is effectively implemented by ASICs. Design of irreducible polynomial is proposed and discussed. Our developments and findings are empowered by the low-power FinFET FPGA architecture.
During recent years, various encryption algorithms have been proposed for color image encryption based on DNA encoding. Image encryption is one of the most important areas of research which has taken attentions of res...
详细信息
During recent years, various encryption algorithms have been proposed for color image encryption based on DNA encoding. Image encryption is one of the most important areas of research which has taken attentions of researchers all over the world that is applicable in transmitting medical images over the insecure communication channels. In this study, a systematic review on DNA based encryption algorithms solely developed for RGB color images is performed in the period of 2000 to 2017. The comparison results on 11 included studies in terms of key space, correlation coefficient, NPCR, UACI, and information entropy showed that there were no significant improvements among the encryption algorithms using the Lena image. In conclusion, for assessing the performance of these kinds of encryption algorithms, development of large sets of benchmark image databases along with publicly available source codes or web servers are highly essential. (c) 2018 Elsevier Inc. All rights reserved.
In order to discuss the synchronization characteristic of a class of the cellular neural network and Lorenz hyper chaotic systems. This paper puts forward on the control method between different chaotic and dimensions...
详细信息
In order to discuss the synchronization characteristic of a class of the cellular neural network and Lorenz hyper chaotic systems. This paper puts forward on the control method between different chaotic and dimensions system, using the controller and base on stability theory of Lyapunov to analysis of the synchronization stability. Finally a synchronization encryption algorithm for audio is presented as a new design. The simulation results show that there is not much correlation between the waveform of the audio document after it's encrypted with that of the original one. By comparing the spectrum, it further testifies that the encryption effect of this design is remarkable.
In the present time of increasing digital communication, the images are widely used over the multimedia networks for sharing of information. At the same time to ensure the security of images during transmission of dat...
详细信息
In the present time of increasing digital communication, the images are widely used over the multimedia networks for sharing of information. At the same time to ensure the security of images during transmission of data becomes a great challenge for cryptographers. In this paper, a new multi-phases image encryption algorithm based on the RSA cryptosystem and modified random matrix affine cipher (MRMAC) is proposed. The Chen's hyperchaotic system and Arnold cat map are used to create more distraction from the relationship between the original image and ciphered image. The Chen's hyperchaotic system is used for diffusion, whereas the Arnold cat map is used for increasing the confusion among pixels. In this proposed algorithm the image ciphering is carried out in different phases. Firstly the given image is encrypted using RSA algorithm with large primes. Secondly, in modified RMAC, random blocks of random entries using Chen's hyperchaotic system are generated and are diffused with image pixels using bitwise XOR operation. Also, we create confusion of pixels within these diffused blocks, and confusion of blocks as well using parameters of MRMAC. The randomness in the algorithm is improved using MRMAC is advantage against differential attacks. Further, the Arnold cat map is used to enhance the level of confusion. Since, it is tremendously difficult to factorize the product of large prime numbers, therefore, the security of data in RSA algorithm increases tremendously. For the proper decryption of ciphered images, one must have exact values of keys and their correct order. It is impossible to guess the decrypted image even with a very small change in a single key. The results obtained in statistical and security analysis shows that the proposed algorithm has a huge key space, extreme security and key sensitivity, which proves that scheme is efficient and highly secure.
In recent years,the Intemet has proved to be a powerful tool for real-time ***,security risk of the Intemet communication still stops people to bring the real-time application into a *** work has so far been done in d...
详细信息
In recent years,the Intemet has proved to be a powerful tool for real-time ***,security risk of the Intemet communication still stops people to bring the real-time application into a *** work has so far been done in developing a data encryption algorithm for Intemet-based real-time *** order to satisfy the security requirements of Internet-based real-time systems,two hybrid data encryption algorithms are *** is the combination of the Advanced encryption Standard(AES) and the most popular public-key cryptography(RSA);the other is the combination of the AES and Secure Sockets Layer(SSL). The end-to-end encryption latency of different algorithms is investigated to show the efficiency of the two new algorithms for Internet-based real-time applications.
This study proposes a chaos-based image encryption scheme using Henon map and Lorenz equation with multiple levels of diffusion. The Henon map is used for confusion and the Lorenz equation for diffusion. Apart from th...
详细信息
This study proposes a chaos-based image encryption scheme using Henon map and Lorenz equation with multiple levels of diffusion. The Henon map is used for confusion and the Lorenz equation for diffusion. Apart from the Lorenz equation, another matrix with the same size as the original image is generated which is a complex function of the original image. This matrix which is configured as a diffusion matrix permits two stages of diffusion. Due to this step, there is a strong sensitivity to input image. This encryption algorithm has high key space, entropy very close to eight (for grey images) and very less correlation among adjacent pixels. The highlight of this method is the ideal number of pixels change rate and unified average changing intensity it offers. These ideal values indicate that the encrypted images produced by this proposed scheme are random-like. Further, a cryptanalysis study has been carried out to prove that the proposed algorithm is resistant to known attacks.
In recent years, with the continuous growth of science and technology in our country, we are exposed to more and more information. Computers are gradually coming into people's lives and constantly changing people&...
详细信息
ISBN:
(纸本)9781728140773
In recent years, with the continuous growth of science and technology in our country, we are exposed to more and more information. Computers are gradually coming into people's lives and constantly changing people's way of life. The scale of emerging services is expanding rapidly. Social networks, big data, Internet of Things and cloud computing are all developing rapidly. However, with the continuous development of the times, so far, the research of big data encryption algorithm has been far from meeting people's needs. With large-scale data volume and information volume, GB, TB and PB have far exceeded the general data statistics volume; at the same time, the surge of redundant data information is also significant. Therefore, it is imperative to solve the problem of redundant data information. In such a large scale of data sets, we should use scientific and effective methods to analyze data and make decisions, and create a stable big data analysis model to deal with the relationship between data.
In this paper, a new circuit which can include a capacitor, an inductor and a novel nonlinear memristor is designed. Complex dynamics and special characters are investigated by changing three parameters for the design...
详细信息
In this paper, a new circuit which can include a capacitor, an inductor and a novel nonlinear memristor is designed. Complex dynamics and special characters are investigated by changing three parameters for the designed chaotic system, whose circuitry realization has been implemented to show its reliability. A novel chaotic behavior which is similar with quasiperiodic oscillation is produced. In addition, a novel image encryption method based on memristor chaotic system and DNA computing is proposed. The experimental results show that the algorithm not only can resist different kinds of attack, but also can improve good encryption effect.
Video applications are essential nowadays. Even though almost everyone has access to it right now, the means and ability to access it is not uniform. Some of the important aspects to consider are the bandwidth availab...
详细信息
ISBN:
(纸本)9781509051700
Video applications are essential nowadays. Even though almost everyone has access to it right now, the means and ability to access it is not uniform. Some of the important aspects to consider are the bandwidth available on the user and the video codec compatibility. Therefore, we need to find a video codec which can be played on most currently available devices and apply lossy compression to get smaller file size while still having good visual quality. Another important aspect to consider is the security of the video. For optimal applications, we should find an encryption algorithm with good combination of security, performance and encryption time. The purpose of this paper is to demonstrate the result of video coding and compression using H.264 and the encryption performance using combination of AES/CFB /PKCS5 padding on various video frames (I, P, B).
暂无评论