期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Image Encryption Algorithm Based on a Chaotic Iterative Process 被引量:1
1
作者 Michael Francois Thomas Grosges +1 位作者 Dominique Barchiesi Robert Erra 《Applied Mathematics》 2012年第12期1910-1920,共11页
The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt secu... The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt securely bit sequences and assuring confusion, diffusion and indistinguishability properties in the cipher. The algorithm is applied on the image encryption where the plain-image is viewed as binary sequence. The results of statistical analysis about randomness, sensitivity and correlation on the cipher-images show the relevance of the proposed cryptosystem. 展开更多
关键词 ENCRYPTION Image Encryption Chaotic Function CONFUSION DIFFUSION INDISTINGUISHABILITY
下载PDF
A Highly Effective DPA Attack Method Based on Genetic Algorithm
2
作者 Shuaiwei Zhang Xiaoyuan Yang +1 位作者 Weidong Zhong Yujuan Sun 《Computers, Materials & Continua》 SCIE EI 2018年第8期325-338,共14页
As one of the typical method for side channel attack,DPA has become a serious trouble for the security of encryption algorithm implementation.The potential capability of DPA attack induces researchers making a lot of ... As one of the typical method for side channel attack,DPA has become a serious trouble for the security of encryption algorithm implementation.The potential capability of DPA attack induces researchers making a lot of efforts in this area,which significantly improved the attack efficiency of DPA.However,most of these efforts were made based on the hypothesis that the gathered power consumption data from the target device were stable and low noise.If large deviation happens in part of the power consumption data sample,the efficiency of DPA attack will be reduced rapidly.In this work,a highly efficient method for DPA attack is proposed with the inspiration of genetic algorithm.Based on the designed fitness function,power consumption data that is stable and less noisy will be selected and the noisy ones will be eliminated.In this way,not only improves the robustness and efficiency of DPA attack,but also reduces the number of samples needed.With experiments on block cipher algorithms of DES and SM4,10%and 12.5%of the number of power consumption curves have been reduced in average with the proposed DPAG algorithm compared to original DPA attack respectively.The high efficiency and correctness of the proposed algorithm and novel model are proved by experiments. 展开更多
关键词 DPA EFFICIENCY noise genetic algorithm fitness function novel model
下载PDF
A Novel Pseudo Random Number Generator Based on Two Plasmonic Maps
3
作者 Michael Francois Thomas Grosges +1 位作者 Dominique Barchiesi Robert Erra 《Applied Mathematics》 2012年第11期1664-1673,共10页
In plasmonic systems, the response of nanoobjects under light illumination can produce complex optical maps. Such plasmonic or resonant systems have interesting characteristics such as sensitivity on parameters and in... In plasmonic systems, the response of nanoobjects under light illumination can produce complex optical maps. Such plasmonic or resonant systems have interesting characteristics such as sensitivity on parameters and initial conditions. In this paper, we show how these complex maps can be cryptographically improved and associated in order to design a secure pseudo random number generator. 展开更多
关键词 PLASMONICS Applied Classical Electromagnetism Pseudo-Random Number Generator RANDOMNESS CRYPTOGRAPHY Remeshing Process
下载PDF
High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction 被引量:2
4
作者 Kaili QI Minqing ZHANG +1 位作者 Fuqiang DI Yongjun KONG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第8期1156-1168,共13页
To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)prediction.First,according t... To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)prediction.First,according to the smoothness of the image,the image is partitioned into blocks based on adaptive quadtree partitioning,and then blocks of different sizes are encrypted and scrambled at the block level to resist the analysis of the encrypted images.In the data embedding stage,the adaptive MSB prediction method proposed by Wang and He(2022)is improved by taking the upper-left pixel in the block as the target pixel,to predict other pixels to free up more embedding space.To the best of our knowledge,quadtree partitioning is first applied to RDH-EI.Simulation results show that the proposed method is reversible and separable,and that its average embedding capacity is improved.For gray images with a size of 512×512,the average embedding capacity is increased by 25565 bits.For all smooth images with improved embedding capacity,the average embedding capacity is increased by about 35530 bits. 展开更多
关键词 Adaptive quadtree partitioning Adaptive most significant bit(MSB)prediction Reversible data hiding in encrypted images(RDH-EI) High embedding capacity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部