A New Image Encryption Algorithm Using a Hyperchaotic Lorenz System to Produce Efficient and Sufficiently Swift Responses to Different Security Needs of Clients

Publish Year: 1402
نوع سند: مقاله ژورنالی
زبان: English
View: 49

This Paper With 18 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JOPN-8-3_001

تاریخ نمایه سازی: 25 بهمن 1402

Abstract:

Abstract This paper proposes a new plaintext-related mechanism based on plaintext encryption.  For simplicity, PCODE was proposed as the image encryption code. The original picture was encoded to get the proposed encryption and plaintext encryption with a chaotic sequence to control the PCODE rules. Another chaotic sequence was encoded into a PCODE sequence for the PCODE XOR operation. The remaining two chaotic sequences were then processed with the proposed scheme to get two key streams for the permutation phase. The cipher image was obtained after the conventional permutation and PCODE XOR operations. The use of the proposed plaintext encryption leads to the correlation between the keystreams used in the displacement phase and both the secret key and the plaintext image. This correlation increases the sensitivity and security of the encryption system with respect to the plaintext. The experimental findings from simulation show that the proposed encryption system shows significant efficiency and security.

Authors

Zahra Kaviyani

Department of Electrical Engineering Telecommunications, Faculty of Engineering Sciences, Shiraz Branch, Islamic Azad University, Shiraz, Iran

Mahnaz Mohammadi

Department of Electrical Engineering Telecommunications, Faculty of Engineering Sciences, Shiraz Branch, Islamic Azad University, Shiraz, Iran

abbas kamaly

Department of Electrical Engineering, Faculty of Engineering Sciences, Fasa Branch, Islamic Azad University, Fasa, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Ning, H., Liu, H., Ma, J., Yang, L. T., & ...
  • Available:https://www.sciencedirect.com/science/article/abs/pii/S۰۱۶۷۷۳۹X۱۵۰۰۲۳۵۶[۲] Amor, A. B., Abid, M., & Medb, A. Secure ...
  • Available:https://ieeexplore.ieee.org/ielaam/۶۲۸۷۶۳۹/۸۶۰۰۷۰۱/۸۹۱۷۹۹۱-aam.pdf[۳] Ding, S., Li, C., & Li, H. A novel ...
  • Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=۸۳۵۹۴۰۷[۴] Zhang, Y., Li, J., & Yan, H. Constant ...
  • Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=۸۶۸۱۵۲۲[۵] Ning, J., Cao, Z., Dong, X., & Wei, ...
  • Available:https://www.scinapse.io/papers/۲۵۲۰۳۴۲۶۰۹[۶] Chuman, T., Sirichotedumrong, W., & Kiya, H. Encryption-then-compression systems ...
  • Available:https://www.sciencedirect.com/science/article/abs/pii/S۰۱۶۵۱۶۸۴۱۹۳۰۲۱۸X[۹] Farah, M. B., Farah, A., & Farah, T. An ...
  • Available:https://www.hindawi.com/journals/complexity/۲۰۲۰/۹۵۹۷۶۱۹/ [۱۰] Khan, P. W., & Byun, Y. A blockchain-based secure ...
  • Available: https://www.mdpi.com/۱۰۹۹-۴۳۰۰/۲۲/۲/۱۷۵[۱۱] Mondal, B., Kumar, P., & Singh, S. A ...
  • Available: https://link.springer.com/article/۱۰.۱۰۰۷/s۱۱۰۴۲-۰۱۸-۶۲۱۴-z[۱۲] Chowdhary, C. L., Patel, P. V., Kathrotia, K. ...
  • Available: https://www.mdpi.com/۱۴۲۴-۸۲۲۰/۲۰/۱۸/۵۱۶۲[۱۳] Wang, J., Zhi, X., Chai, X., & Lu, ...
  • Available: https://jisis.org/article/jisis-۲۰۲۱-vol۱۱-no۲-۰۴/۶۹۴۶۴/[۱۵] Zhang, L., Liang, P., & Mu, Y. Improving ...
  • Available :https://ro.uow.edu.au/cgi/viewcontent.cgi?article=۲۲۸[۱۶] Alshehri, M., & Panda, B. Minimizing Data Breach ...
  • Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=۹۳۸۷۳۰۹ [۱۸] Ahmad, M., Al Solami, E., Wang, X. Y., ...
  • Available:https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=۹۴۶۵۱۶۶R [۱۹] Yahyazadeh , Z.Hashempour , Effect of Hydrostatic Pressure on ...
  • Available: https://jopn.marvdasht.iau.ir/article_۴۷۶۸.html [۲۰] M. Mohammadi , A.Zolghadr , M. Pourmina , ...
  • Available: https://jopn.marvdasht.iau.ir/article_۳۰۴۵.html [۲۱] M.Momeni , M Javadian Sarraf , F.Khatib ,Design ...
  • Available: https://jopn.marvdasht.iau.ir/article_۵۰۴۰.html [۲۲] M.Rajaee, S. Rabiee , Analysis and Implementation of ...
  • Avalable: https://jopn.marvdasht.iau.ir/article_۴۹۸۱.html [۲۳] Sh.Shahi, P. Momayezan , M. Ranjbaran, S. Wadi ...
  • Avalable: https://jopn.marvdasht.iau.ir/article_۴۴۰۵.html [۲۴] Wang, Q., Peng, L., Xiong, H., Sun, J., ...
  • Available: https://ieeexplore.ieee.org/document/۸۱۱۹۷۹۳ [۲۵] Alrawais, A., Alhothaily, A., Hu, C., & Cheng, ...
  • نمایش کامل مراجع