مشخصات مقاله | |
ترجمه عنوان مقاله | الگوریتم رمزگذاری تصویر جدید بر اساس ترکیب چندجمله ای نقشه بی نظمی و تولید تابع پویا |
عنوان انگلیسی مقاله | A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation |
انتشار | مقاله سال 2019 |
تعداد صفحات مقاله انگلیسی | 23 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس میباشد |
نمایه (index) | Scopus – Master Journal List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
3.933 در سال 2017 |
شاخص H_index | 105 در سال 2019 |
شاخص SJR | 0.94 در سال 2017 |
شناسه ISSN | 0165-1684 |
شاخص Quartile (چارک) | Q1 در سال 2017 |
رشته های مرتبط | مهندسی کامپیوتر |
گرایش های مرتبط | مهندسی الگوریتم ها و محاسبات، مهندسی نرم افزار، هوش مصنوعی |
نوع ارائه مقاله |
ژورنال |
مجله | پردازش سیگنال – Signal Processing |
دانشگاه | Department of Computer Engineering, Faculty of Electrical and Computer Engineering, University of Tabriz, Iran |
کلمات کلیدی | رمزگذاری تصویر، نقشه بی نظمی 1D، جفتگری چندجمله ای، مولد عدد تصادفی، اثر پروانه ای، تولید تابع پویا |
کلمات کلیدی انگلیسی | Image encryption، 1D chaotic maps، Polynomial coupling، Random number generator، Butterfly effect، Dynamic function generation |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.sigpro.2018.11.010 |
کد محصول | E11141 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- Related study 3- Chaotic systems 4- Proposed polynomial chaotic system 5- Proposed image encryption scheme 6- Cryptanalysis of the proposed algorithm 7- Conclusion References |
بخشی از متن مقاله: |
Abstract Present paper introduces a polynomial combination of one dimensional chaotic maps that is blended in a dynamic image encryption algorithm. It is special because not only this combination has butterfly folding effect but also it shows generalization property over any polynomial combination. Hence, the butterfly folding effect is caused by governed parameters of polynomial combination. Moreover, multiple simulations and evaluations show the superiority of the proposed chaotic system. An application of this system, which we propose in cryptography, is a novel image encryption algorithm based on dynamic function generation. Compared to the state of the art algorithms, our image encryption algorithm has higher statistical and cryptanalytic properties. Even though this algorithm is not suitable for real-time applications such as streaming video encryption, it makes a good use of the proposed chaotic system. Uppermost cryptanalytic properties that are proven by statistical/numeric tests show good performance and reliability of proposed algorithm for image encryption tasks while unlike any other chaotic image encryption system, our algorithm uses a string input for secret key. Introduction This is the rapid growth of network users and data transmits that has led the security researchers to devise much secure infrastructure and cryptographic algorithms. On the other hand, the cryptanalysts have also gained more computing power to put these new inventions to test [1]. Although there are many algorithms that can be used for making a secure data transmit such as AES (Advanced Encryption Algorithm) [2], some successful attacks have been reported to these algorithms; Biclique Cryptanalysis [3] is an example. In cryptography culture, TuxECB effect is a major drawback of these conventional algorithms. Figure 1 shows an inevitable effect happening due to block cipher nature of ECB algorithms like AES. This semantically incorrect cryptographic scheme (along with other problems mentioned earlier) fuels researchers of criteria (e. g. cryptographers) towards more reliable encryption systems and algorithms. Due to their random-like behavior and high statistical scores on various tests such as NIST random number test, correlation analysis and information entropy, chaotic image and media encryption methods have earned so much attention. However, in many aspects, successful attacks on some of these algorithms has been applied and security flaws is reported by various researchers [4–11]. In near future, with increasing higher user interests in social networking (e.g. on websites like Facebook, Insta gram which mostly rely on media as content) mentioned problems can be much more critical. This happens because increase in user generated content needs much secure data transmit that can be decrypted on both sides of transmission line. However, the problem on user side rises as the decrypting device (e. g. mobile phone or a VR glass) lacks com putational and storage resources. This problem can be solved by a fast, secure and easily implementable encryption algorithm that needs no more information rather than the encrypted message and a securely shared secret key. On some study cases, researchers used another image called as key-image for secret key to ensure this security but the employed methodology increases data transition by a factor of ×2. |