期刊文献+
共找到274,745篇文章
< 1 2 250 >
每页显示 20 50 100
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
1
作者 Mingliang Sun Jie Yuan +1 位作者 Xiaoyong Li Dongxiao Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期2625-2646,共22页
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors. 展开更多
关键词 Image encryption chaotic system compressive sensing arnold transform
下载PDF
Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System
2
作者 Zhiqing Dong Zhao Zhang +1 位作者 Hongyan Zhou Xuebo Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期1977-1993,共17页
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of pictures.This study presents a new approach to the encryption and compression of color image... With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of pictures.This study presents a new approach to the encryption and compression of color images.It is predicated on 2D compressed sensing(CS)and the hyperchaotic system.First,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security.Then,the processed images are con-currently encrypted and compressed using 2D CS.Among them,chaotic sequences replace traditional random measurement matrices to increase the system’s security.Third,the processed images are re-encrypted using a combination of permutation and diffusion algorithms.In addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct images.Compared with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational complexity.Furthermore,it has better robustness.The experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective. 展开更多
关键词 Image encryption image compression hyperchaotic system compressed sensing
下载PDF
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
3
作者 苏静明 方士辉 +1 位作者 洪炎 温言 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期233-243,共11页
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc. 展开更多
关键词 color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling
下载PDF
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
4
作者 Vincent Mbonigaba Fulgence Nahayo +1 位作者 Octave Moutsinga Okalas-Ossami Dieudonné 《Journal of Information Security》 2024年第1期53-62,共10页
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco... In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys. 展开更多
关键词 KEY Wave ELECTROMAGNETIC CRYPTOGRAPHY POST Quantum Network Protocol Propagation algorithm
下载PDF
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing 被引量:1
5
作者 王兴元 王哓丽 +2 位作者 滕琳 蒋东华 咸永锦 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期136-149,共14页
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryption algorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryption algorithm has very high visual security. 展开更多
关键词 chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption 被引量:1
6
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain IOT integration of IoT and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM
7
作者 Luoyin Feng Jize Du Chong Fu 《Computers, Materials & Continua》 SCIE EI 2023年第11期1645-1662,共18页
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chao... In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images.So,this paper addresses this gap by studying the generation of pseudo-random sequences(PRS)chaotic signals using dual logistic chaotic maps.These signals are then predicted using long and short-term memory(LSTM)networks,resulting in the reconstruction of a new chaotic signal.During the research process,it was discovered that there are numerous training parameters associated with the LSTM network,which can hinder training efficiency.To overcome this challenge and improve training efficiency,the paper proposes an improved particle swarm optimization(IPSO)algorithm to optimize the LSTM network.Subsequently,the obtained chaotic signal from the optimized model training is further scrambled,obfuscated,and diffused to achieve the final encrypted image.This research presents a digital image encryption(DIE)algorithm based on a double chaotic map(DCM)and LSTM.The algorithm demonstrates a high average NPCR(Number of Pixel Change Rate)of 99.56%and a UACI(Unified Average Changing Intensity)value of 33.46%,indicating a strong ability to resist differential attacks.Overall,the proposed algorithm realizes secure and sensitive digital image encryption,ensuring the protection of personal information in the Internet environment. 展开更多
关键词 Digital image encryption LSTM particle swarm optimization algorithm DCM
下载PDF
Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map
8
作者 叶国栋 吴惠山 +1 位作者 黄小玲 Syh-Yuan Tan 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期153-163,共11页
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami... Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8. 展开更多
关键词 three-dimensional improved logistic chaotic map(3D-ILM) Rivest–Shamir–Adleman(RSA)algorithm image encryption CONFUSION ENTROPY
下载PDF
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
9
作者 Umi Salma Basha Shashi Kant Gupta +2 位作者 Wedad Alawad SeongKi Kim Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第5期3397-3416,共20页
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data. 展开更多
关键词 Cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA)
下载PDF
Optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system and compressed sensing
10
作者 都洋 隆国强 +2 位作者 蒋东华 柴秀丽 韩俊鹤 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第11期426-445,共20页
Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak corre... Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak correlation with plaintext images, poor image reconstruction quality, and low efficiency in transmission and storage. To solve these issues,this paper proposes an optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system(4D MHS) and compressed sensing(CS). Firstly, this paper proposes a new 4D MHS, which has larger key space, richer dynamic behavior, and more complex hyperchaotic characteristics. The introduction of CS can reduce the image size and the transmission burden of hardware devices. The introduction of double random phase encoding(DRPE) enables this algorithm has the ability of parallel data processing and multi-dimensional coding space, and the hyperchaotic characteristics of 4D MHS make up for the nonlinear deficiency of DRPE. Secondly, a construction method of the deterministic chaotic measurement matrix(DCMM) is proposed. Using DCMM can not only save a lot of transmission bandwidth and storage space, but also ensure good quality of reconstructed images. Thirdly, the confusion method and diffusion method proposed are related to plaintext images, which require both four hyperchaotic sequences of 4D MHS and row and column keys based on plaintext images. The generation process of hyperchaotic sequences is closely related to the hash value of plaintext images. Therefore, this algorithm has high sensitivity to plaintext images. The experimental testing and comparative analysis results show that proposed algorithm has good security and effectiveness. 展开更多
关键词 MEMRISTOR hyperchaotic system compressed sensing fractional Fourier transform optical image encryption
下载PDF
A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm
11
作者 Yazeed Yasin Ghadi Mohammed SAlshehri +4 位作者 Sultan Almakdi Oumaima Saidani Nazik Alturki Fawad Masood Muhammad Shahbaz Khan 《Computers, Materials & Continua》 SCIE EI 2023年第10期781-797,共17页
Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal ... Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many symmetric encryption systems.This study introduces an innovative approach to creating S-boxes for encryption algorithms.The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme.The nonlinearity measure of the proposed S-boxes is 112.These qualities significantly enhance its resistance to common cryptographic attacks,ensuring high image data security.Furthermore,to assess the robustness of the S-boxes,an encryption system has also been proposed and the proposed S-boxes have been integrated into the designed encryption system.To validate the effectiveness of the proposed encryption system,a comprehensive security analysis including brute force attack and histogram analysis has been performed.In addition,to determine the level of security during the transmission and storage of digital content,the encryption system’s Number of Pixel Change Rate(NPCR),and Unified Averaged Changed Intensity(UACI)are calculated.The results indicate a 99.71%NPCR and 33.51%UACI.These results demonstrate that the proposed S-boxes offer a significant level of security for digital content throughout its transmission and storage. 展开更多
关键词 S-BOX CHAOS artificial bee colony image encryption
下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
12
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption DECRYPTION cloud security matrix cipher
下载PDF
A color image encryption algorithm based on hyperchaotic map and DNA mutation
13
作者 高昕瑜 孙博 +2 位作者 曹颖鸿 Santo Banerjee 牟俊 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期131-142,共12页
We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynam... We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynamics of hyperchaotic map,a color image encryption scheme is designed.At the end of the encryption process,a DNA mutation operation is used to increase the encoding images’randomness and to improve the encryption algorithm’s security.Finally,simulation experiments,performance analysis,and attack tests are performed to prove the effectiveness and security of the designed algorithm.This work provides the possibility of applying chaos theory and gene theory in image encryption. 展开更多
关键词 color image encryption hyperchaotic map cross-plane permutation DNA mutation
下载PDF
Visually meaningful image encryption algorithm based on digital signature
14
作者 Xiaoling Huang Youxia Dong +2 位作者 Guodong Ye Wun-She Yap Bok-Min Goi 《Digital Communications and Networks》 SCIE CSCD 2023年第1期159-165,共7页
Traditional image encryption algorithms transform a plain image into a noise-like image.To lower the chances for the encrypted image being detected by the attacker during the image transmission,a visually meaningful i... Traditional image encryption algorithms transform a plain image into a noise-like image.To lower the chances for the encrypted image being detected by the attacker during the image transmission,a visually meaningful image encryption scheme is suggested to hide the encrypted image using another carrier image.This paper proposes a visually meaningful encrypted image algorithm that hides a secret image and a digital signature which provides authenticity and confidentiality.The recovered digital signature is used for the purpose of identity authentication while the secret image is encrypted to protect its confidentiality.Least Significant Bit(LSB)method to embed signature on the encrypted image and Lifting Wavelet Transform(LWT)to generate a visually meaningful encrypted image are designed.The proposed algorithm has a keyspace of 139.5-bit,a Normalized Correlation(NC)value of 0.9998 which is closer to 1 and a Peak Signal to Noise Ratio(PSNR)with a value greater than 50 dB.Different analyses are also performed on the proposed algorithm using different images.The experimental results show that the proposed scheme is with high key sensitivity and strong robustness against pepper and salt attack and cropping attack.Moreover,the histogram analysis shows that the original carrier image and the final visual image are very similar. 展开更多
关键词 Visually meaningful image encryption Lifting wavelet transform Lorenz system SIGNATURE SECURITY
下载PDF
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
15
作者 Mohammed S.Alshehri Sultan Almakdi +1 位作者 Mimonah Al Qathrady Jawad Ahmad 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2401-2414,共14页
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp... Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryption schemes in the literature based on chaotic maps.This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem.The core notion of the original algorithm was based on permutation and diffusion.A bitlevel permutation approach was used to do the permutation row-and column-wise.The diffusion was executed in the forward and backward directions.The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted by the author of the cryptosystem.This cryptanalysis article investigates the robustness of this cryptosystem against a chosen-plaintext attack.The secret keys of the cryptosystem were retrieved by the proposed attack with 258 chosen-plain images.The results in this manuscript suggest that,in addition to standard statistical evaluations,thorough cryptanalysis of each newly suggested cryptosystem is necessary before it can be used in practical application.Moreover,the data retrieved is also passed through some statistical analysis to compare the quality of the original and retrieved data.The results of the performance analysis indicate the exact recovery of the original data.To make the cryptosystem useful for applications requiring secure data exchange,a few further improvement recommendations are also suggested. 展开更多
关键词 CRYPTANALYSIS hyperchaotic map image encryption chosen-plaintext attack CRYPTOSYSTEM
下载PDF
A Cross-Plane Color Image Encryption Algorithm Based on 1D-SLM
16
作者 Xiaohong Wang Huiqing Wu +1 位作者 Yuying Ma Shuzhen Huang 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1093-1108,共16页
With the rapid development of 5G technology,it has become fast and easy for people to transmit information on the Internet.Digital images can express information more intuitively,so transmitting information through im... With the rapid development of 5G technology,it has become fast and easy for people to transmit information on the Internet.Digital images can express information more intuitively,so transmitting information through images has excellent applications.This paper uses a new chaotic system called 1D-Sin-Logistic-Map(1D-SLM).1D-SLM has two control parameters,which can provide larger parameter space,and the parameter space in the chaotic state is continuous.Through Lyapunov exponent analysis(LE),bifurcation diagrams analysis,spectral entropy analysis(SE),and 0-1 test,it is verified that 1D-SLM has complex dynamic behavior and is very suitable for cryptography.Compared with other 1D chaotic systems,the 1D-SLM has a larger Lyapunov exponent(LE)and spectral entropy(SE).For color image encryption algorithms,only relying on chaotic mapping is not enough to ensure security.So combined with 1D-SLM,we design a color image encryption algorithm,which is implemented by plane expansion,which reduces the correlation between the three channels of color images.The experimental results show that the proposed cross-plane color image encryption algorithm is safe and resistant to common attack methods. 展开更多
关键词 Chaos theory chaotic system 1D-SLM image encryption information security
下载PDF
Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment
17
作者 Mohan Nagamunthala Ramakrishnan Manjula 《Journal of Computer and Communications》 2023年第10期135-149,共15页
In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of t... In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method. 展开更多
关键词 Cloud Computing Image encryption
下载PDF
3D Model Encryption Algorithm by Parallel Bidirectional Diffusion and 1D Map with Sin and Logistic Coupling
18
作者 Yongsheng Hu 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1819-1838,共20页
3D models are essential in virtual reality,game development,architecture design,engineering drawing,medicine,and more.Compared to digital images,3D models can provide more realistic visual effects.In recent years,sign... 3D models are essential in virtual reality,game development,architecture design,engineering drawing,medicine,and more.Compared to digital images,3D models can provide more realistic visual effects.In recent years,significant progress has been made in the field of digital image encryption,and researchers have developed new algorithms that are more secure and efficient.However,there needs to be more research on 3D model encryption.This paper proposes a new 3D model encryption algorithm,called the 1D map with sin and logistic coupling(1D-MWSLC),because existing digital image encryption algorithms cannot be directly applied to 3D models.Firstly,this paper introduce 1D-MWSLC,which has a wider range of parameters compared to traditional 1D chaotic systems.When the parameter exceeds a specific range,the chaotic phenomenon does not weaken.Additionally,1D-MWSLC has two control parameters,which increases the cryptosystem’s parameter space.Next,1D-MWSLC generates keystreams for confusion and diffusion.In the confusion stage,this paper use random confusion,and the keystream generates an index matrix that confuses the integer and decimal parts of the 3D model simultaneously.In the diffusion stage,this paper use parallel bidirectional diffusion to simultaneously diffuse the integer parts of the three coordinates of the 3D model.Finally,this paper verify the proposed algorithm through statistical analysis,and experimental results demonstrate that the proposed 3D model encryption algorithm has robust security. 展开更多
关键词 Parallel bidirectional diffusion chaos theory 1D-MWSLC image encryption information security
下载PDF
Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT
19
作者 M.Suresh Kumar T.Purosothaman 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期925-938,共14页
The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive... The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive power consumption,which constitute a danger to intelligent IoT-based apps.Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member.A centralized trustworthy system,which is in charge of key distribution and upgrades,is used to maintain group keys.To provide longitudinal access controls,Software Defined Network(SDN)based security controllers are employed for group administration services.Cloud service providers provide a variety of security features.There are just a few software security answers available.In the proposed system,a hybrid protocols were used in SDN and it embeds edge system to improve the security in the group communication.Tree-based algorithms compared with Group Key Establishment(GKE)and Multivariate public key cryptosystem with Broadcast Encryption in the proposed system.When all factors are considered,Broadcast Encryption(BE)appears to become the most logical solution to the issue.BE enables an initiator to send encrypted messages to a large set of recipients in a efficient and productive way,meanwhile assuring that the data can only be decrypted by defining characteristic.The proposed method improves the security,efficiency of the system and reduces the power consumption and minimizes the cost. 展开更多
关键词 Internet of things encryption DECRYPTION group key software defined network public key security
下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
20
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部