Yan et al., 2023 - Google Patents
A conservative chaotic system with coexisting chaotic-like attractors and its application in image encryptionYan et al., 2023
- Document ID
- 3705475973491944584
- Author
- Yan M
- Xie J
- Publication year
- Publication venue
- Journal of Control and Decision
External Links
Snippet
Unlike dissipative systems, conservative systems do not have attractors and no attractor reconstruction occurs. Therefore, these systems are more suitable for application in image encryption. On the basis of above appoints, here we develop and propose a conservative …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhou et al. | A novel image encryption cryptosystem based on true random numbers and chaotic systems | |
| Hu et al. | Quantum image encryption scheme based on 2d s ine 2-l ogistic chaotic map | |
| He et al. | A new image encryption algorithm based on the OF-LSTMS and chaotic sequences | |
| Yasser et al. | A new image encryption scheme based on hybrid chaotic maps | |
| Patel et al. | Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique | |
| Zhou et al. | Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system | |
| Gong et al. | Quantum image encryption algorithm based on quantum image XOR operations | |
| Wang et al. | A chaotic image encryption algorithm based on a counting system and the semi-tensor product | |
| Zhou et al. | Quantum image encryption based on generalized Arnold transform and double random-phase encoding | |
| Yang et al. | Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption | |
| Bouteghrine et al. | Novel image encryption algorithm based on new 3-d chaos map | |
| Yang et al. | Novel image encryption based on quantum walks | |
| Hamza et al. | A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map | |
| Zhang | The image encryption algorithm with plaintext-related shuffling | |
| Kang et al. | Color image encryption using pixel scrambling operator and reality-preserving MPFRHT | |
| Wang et al. | A novel image encryption algorithm based on chaotic shuffling method | |
| Brahim et al. | A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes | |
| Lone et al. | A novel image encryption using random matrix affine cipher and the chaotic maps | |
| Saravanan et al. | A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption: S. Saravanan, M. Sivabalakrishnan | |
| Mir et al. | Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain | |
| Wang et al. | A novel block cryptosystem based on the coupled chaotic map lattice | |
| Som et al. | Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator | |
| Gopalakrishnan et al. | Chaotic image encryption with hash keying as key generator | |
| Islam et al. | Enhancing image security through an advanced chaotic system with free control and zigzag scrambling encryption | |
| Yan et al. | A conservative chaotic system with coexisting chaotic-like attractors and its application in image encryption |