[go: up one dir, main page]

Cheng et al., 2022 - Google Patents

Novel One‐Dimensional Chaotic System and Its Application in Image Encryption

Cheng et al., 2022

View HTML @Full View
Document ID
564753777218830753
Author
Cheng Z
Wang W
Dai Y
Li L
Publication year
Publication venue
Complexity

External Links

Snippet

Designing a chaotic system with a simple structure and complex dynamic behavior is one of the main tasks of chaotic cryptography. This paper designs a new 1D chaotic system called 1D two‐parameters‐sin‐cos (1D‐TPSC). Compared with high‐dimensional chaotic systems …
Continue reading at onlinelibrary.wiley.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Similar Documents

Publication Publication Date Title
Zheng et al. Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map
Tang et al. Image encryption with double spiral scans and chaotic maps
Kumar et al. A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
Herbadji et al. Colour image encryption scheme based on enhanced quadratic chaotic map
Norouzi et al. A fast color image encryption algorithm based on hyper-chaotic systems
Ye et al. An effective framework for chaotic image encryption based on 3D logistic map
Lone et al. A novel image encryption using random matrix affine cipher and the chaotic maps
Gafsi et al. Efficient encryption system for numerical image safe transmission
Koppu et al. A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform
Kengnou Telem et al. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network
Li et al. A new image encryption algorithm based on optimized Lorenz chaotic system
Attaullah et al. Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption
Nkandeu et al. Image encryption algorithm based on synchronized parallel diffusion and new combinations of 1D discrete maps
Fang et al. A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding
Cheng et al. Novel One‐Dimensional Chaotic System and Its Application in Image Encryption
Zheng et al. An image encryption algorithm based on multichaotic system and DNA coding
Signing et al. Dynamic phenomena of a financial hyperchaotic system and DNA sequences for image encryption
Jia Image encryption with cross colour field algorithm and improved cascade chaos systems
Abdul-Kareem et al. An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain
Raghuvanshi et al. A data encryption model based on intertwining logistic map
Gao et al. An Image Encryption Algorithm Based on the Improved Sine‐Tent Map
Gao et al. New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem
Cheng et al. A High‐Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Zhang et al. An efficient image encryption algorithm based on S-box and DNA code
Murillo-Escobar et al. A chaotic encryption algorithm for image privacy based on two pseudorandomly enhanced logistic maps