[go: up one dir, main page]

Yan et al., 2023 - Google Patents

A conservative chaotic system with coexisting chaotic-like attractors and its application in image encryption

Yan et al., 2023

Document ID
3705475973491944584
Author
Yan M
Xie J
Publication year
Publication venue
Journal of Control and Decision

External Links

Snippet

Unlike dissipative systems, conservative systems do not have attractors and no attractor reconstruction occurs. Therefore, these systems are more suitable for application in image encryption. On the basis of above appoints, here we develop and propose a conservative …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals

Similar Documents

Publication Publication Date Title
Zhou et al. A novel image encryption cryptosystem based on true random numbers and chaotic systems
Hu et al. Quantum image encryption scheme based on 2d s ine 2-l ogistic chaotic map
He et al. A new image encryption algorithm based on the OF-LSTMS and chaotic sequences
Yasser et al. A new image encryption scheme based on hybrid chaotic maps
Patel et al. Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique
Zhou et al. Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system
Gong et al. Quantum image encryption algorithm based on quantum image XOR operations
Wang et al. A chaotic image encryption algorithm based on a counting system and the semi-tensor product
Zhou et al. Quantum image encryption based on generalized Arnold transform and double random-phase encoding
Yang et al. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
Bouteghrine et al. Novel image encryption algorithm based on new 3-d chaos map
Yang et al. Novel image encryption based on quantum walks
Hamza et al. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
Zhang The image encryption algorithm with plaintext-related shuffling
Kang et al. Color image encryption using pixel scrambling operator and reality-preserving MPFRHT
Wang et al. A novel image encryption algorithm based on chaotic shuffling method
Brahim et al. A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes
Lone et al. A novel image encryption using random matrix affine cipher and the chaotic maps
Saravanan et al. A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption: S. Saravanan, M. Sivabalakrishnan
Mir et al. Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain
Wang et al. A novel block cryptosystem based on the coupled chaotic map lattice
Som et al. Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator
Gopalakrishnan et al. Chaotic image encryption with hash keying as key generator
Islam et al. Enhancing image security through an advanced chaotic system with free control and zigzag scrambling encryption
Yan et al. A conservative chaotic system with coexisting chaotic-like attractors and its application in image encryption