版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、In today's world, there is an ever increasing need for new techniques of maintaining and protecting privacy and integrity of information of mass communication and private information.Chaos theory and cryptography overlap
2、 some features which can lead to developing secure chaos-based cryptosystem for secure communication of texts and images.Some of the basic features of chaotic systems such as sensitivity to initial conditions,ergodicity,
3、 and pseudorandom behavior, fulfill the analogous requirements for a good cryptosystem.
This thesis focuses on the chaos theory, chaotic systems and its types, design of cryptographically strong S-boxes based on hyp
4、erchaotic system and image encryption based on the hyperchaotic system.The proposed research work conducted in two parts based on hyperchaos.
The first part contains a design of cryptographically strong S-box via th
5、e 4D hyperchaotic multi-wing system.At a fundamental level, the security of symmetric key cryptosystems ties back to Shannon's properties of diffusion and confusion.In constructions of a symmetric key cryptosystem, diffu
6、sion and confusion are commonly realized with the application of linear and nonlinear operations, respectively.The Substitution boxes (S-boxes) are the only nonlinear part in a Substitution-Permutation cryptosystem.Witho
7、ut these nonlinear components, the adversaries would easily compromise the system.Therefore, S-box plays an imperative role in designing a cryptographically strong block cipher.Designing S-box based on chaos has attracte
8、d lots of attentions because of its distinct characteristics relevant to cryptography.In the proposed work, a batch generation of cryptographically strong S-boxes based on the 4-D 4-wing hyperchaotic system is presented.
9、The sophisticated nonlinear behaviors of suggested hyperchaotic system are used to generate two pseudorandom 8-bit integer sequence, which further drives iterative two-position swap on the identical map on GF(28).Accordi
10、ng to the indicator of typical evaluation criteria including nonlinearity,differential uniformity, SAC, output bits independence criterion and bijective property, the preferred S-box is obtained from all those patch-gene
11、rated ones.The comparison with the state-of-the-art chaos-based schemes shows that the obtained S-box achieves better cryptographical performance.
Secondly, the presented work focuses on permutation-substitution ima
12、ge encryption based on 4D four-wing hyperchaotic system.In the field of cryptography, a huge research is undergoing on image ciphering to assure security vulnerabilities in confidential images.Multi-dimensional Hyperchao
13、s is emerging area to enhance the security requirement in realtime image encryption instead of the one-dimensional chaotic system due to large key space and complex unpredictable nature.A 4D 4-wing hyperchaotic system is
14、 employed to encrypt an image with two independent core procedures i.e.permutation and substitution.A permutation is executed in both column-wise and row-wise by permutation index matrix to spread the influence of a sing
15、le pixel over others.Moreover, the permuted image is completely confused twice in substitution process.Firstly, each previous ciphered pixel value is XORed with next plain image pixel in the forward direction.Secondly, a
16、 key image is produced from a cryptographically strong S-box based on the 4D 4-wing hyperchaotic system.A key image is used for pixel by pixel masking to complete the encryption process.The proposed method is simple, eas
17、y to implement, with large key space and capable of encrypting different type of grayscale images with perfect scrambling nature.Histogram analysis, correlation of adjacent pixels analysis, information entropy analysis,
18、key space analysis, key sensitivity analysis, NPCR, and UACI analysis quantify the security level and efficiency of the suggested method.Security analysis shows that the proposed algorithm has high security and abilities
19、 to resist statistical attacks, brute-force attacks and differential attacks, which provides enough security for real-time image encryption and transmission.
Finally, the whole conclusion is drawn, and the further d
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- parallel image encryption algorithm based on discretized chaotic map
- control system design of constant temperature box based on pid
- 基于混沌計(jì)算智能算法的S-box設(shè)計(jì)方法.pdf
- Design and Implementation of a DCT-Based Robust Digital Image Watermarking Scheme.pdf
- An Eclectic Image Encryption Scheme Depending on Chaos Algorithm.pdf
- Realization of Image Encryption Using DES and MD5.pdf
- 輕量級(jí)與非滿射S-box的分組密碼算法的分析.pdf
- 基于循環(huán)式結(jié)構(gòu)和復(fù)合域s-box的AES算法IP設(shè)計(jì)與驗(yàn)證.pdf
- design of the temperature control system based on at89s51
- based on partial differential equations of image inpainting
- Image Similarity Matching Based On Colour and Texture.pdf
- PDE Based Methods for Image Denoising and Segmentation.pdf
- Digital Image Watermarking Based on Dwt-DCT.pdf
- Text-Based and Content-Based Image Retrieval on Flickr DEMO.pdf
- quick registration method based on image region correlation
- the study on product design’s cost control using case-based reasoning
- Text-Based and Content-Based Image Retrieval on Flickr DEMO.pdf
- image_s.gif
- image_s.gif
- study on case—based fixture design
評(píng)論
0/150
提交評(píng)論