مقاله انگلیسی رایگان در مورد سیستم های هرج و مرج یکپارچه برای رمزنگاری تصویر – الزویر 2018

 

مشخصات مقاله
ترجمه عنوان مقاله سیستم های هرج و مرج یکپارچه برای رمزنگاری تصویر
عنوان انگلیسی مقاله Integrated chaotic systems for image encryption
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 32 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله پژوهشی (Research article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) scopus – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
3.470 در سال 2017
شاخص H_index 0.94 در سال 2018
شاخص SJR 94 در سال 2018
رشته های مرتبط مهندسی کامپیوتر
گرایش های مرتبط امنیت اطلاعات
نوع ارائه مقاله
ژورنال
مجله / کنفرانس پردازش سیگنال – Signal Processing
دانشگاه Guilin University of Electronic Technology – China
کلمات کلیدی نقشه های بی نظم، رمزنگاری تصویر، سیستم های آشوبناک یکپارچه
کلمات کلیدی انگلیسی chaotic maps, image encryption, integrated chaotic systems.
شناسه دیجیتال – doi
https://doi.org/10.1016/j.sigpro.2018.01.026
کد محصول E10160
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Highlights
Abstract
Keywords
1 Introduction
2 Preliminaries
3 The proposed ICS
4 Image encryption
5 Simulation results
6 Security analysis
7 Conclusions
Acknowledgement
References

بخشی از متن مقاله:
Abstract

To improve the randomicity behaviors of some existing chaotic maps, this paper proposes two integrated chaotic systems (ICS), which conduct cascade, nonlinear combination, and switch operations to three basic 1D chaotic maps to generate new structures. The developed systems are able to yield several more complicated chaotic maps. Compared with several existing maps, the newlygenerated ones have more advanced properties, including wider chaotic ranges, and more complex chaotic behaviors. To demonstrate the effectiveness of ICS, we also design an image encryption scheme based on ICS. Simulation results on different types of images and extensive security analysis demonstrate that the proposed approach has satisfactory properties in image encryption.

Introduction

Chaos theory was first developed in meteorological science by American scientist E.N. Lorenz [1]. As one of the nonlinear dynamics, chaos attracts a huge number of research interests [2, 3], playing many important roles in various fields, such as science, engineering [4, 5] and economic [6]. More specifically, chaos theory has achieved extremely high application values in electrical engineering [7], e.g., communications [8], random number generators [9], and information security [10, 11, 12]. There are three significant properties of chaotic systems: unpredictability, 10 ergodicity, and initial value sensitivity [13]. Chaotic map is one of the most representative chaotic systems that possesses these properties. Existing chaotic maps can be generally divided into two categories: one dimension (1D) maps and high dimension (HD) maps. For 1D chaotic maps, they have simple structures and are easy to be implemented [14, 15], but they have the defects of 15 limited chaotic ranges [16] and vulnerability [17]. Recently, several novel 1D chaotic maps have been developed gradually such as cascade chaotic system [18], parameter controlling system [19], and nonlinear combination chaotic system [20]. They all expand the range of chaotic maps to acquire better chaotic behaviors. On the other hand, for HD chaotic systems, they have at least two 20 variables, e.g., the Duffing system [21], Clifford system [22], and H´enon system [23]. Compared with 1D chaotic maps, HD chaotic maps have more complex structures and better chaotic behaviors to make their chaotic orbits more unpredictable [24]. Even though, HD chaotic maps have the limitations of high computation cost and implementation difficulty [25]. 25 Image encryption is a hot topic in the fields of image processing and information security. So far, a large number of image encryption algorithms have been developed from different perspectives, such as SCAN [26], circular random grids [27], elliptic curve ElGamal [28], gyrator transform [29], wave transmission [30], visual cryptography [31], fractional Mellin transform [32], p-Fibonacci trans30 form [33], and chaos-based methods. Among these algorithms, the chaos-based encryption approaches are particularly popular thanks to the previously mentioned properties of chaos, which ensure satisfactory encryption performance. Owing to the insecurity of 1D chaotic maps and high computation cost of HD chaotic maps, chaos-based encryption should take account of the advantages 35 of both 1D and HD chaotic maps to design a better chaotic system [34].

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا