Ahmed Rabea, Mohamed Abdelfattah, Ali Takieldeen, Abeer Khalil
{"title":"Survey Image Cryptanalysis Using a Substitution Box Based Chaotic Map","authors":"Ahmed Rabea, Mohamed Abdelfattah, Ali Takieldeen, Abeer Khalil","doi":"10.21608/ijt.2023.315591","DOIUrl":null,"url":null,"abstract":": Providing a new framework for chaotic image encryption is becoming increasingly important and more significant in various applications, such as the transmission of medical and military photographs. Substitution boxes based on chaos have received a lot of attention lately. Recently, a method of picture encryption based on numerous chaotic Substitution boxes was proposed. Many chaos map-based encryption methods have been proposed, taking advantage of their superior properties such as sensibility to the initial state and controlling factors. This encryption technique was founded on the idea of the confusion that the S-implementation boxes alone may generate. The technique involves incorporating replacement box encryption, working with a chaotic map to extract the output data, encrypting that data using a well-known encryption algorithm, and then having the other party decrypt it. And then to ensure the accuracy of the recovered data, certain statistical analysis is performed on it, including correlation, charts, and entropy.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.4000,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interdisciplinary Telecommunications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijt.2023.315591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
: Providing a new framework for chaotic image encryption is becoming increasingly important and more significant in various applications, such as the transmission of medical and military photographs. Substitution boxes based on chaos have received a lot of attention lately. Recently, a method of picture encryption based on numerous chaotic Substitution boxes was proposed. Many chaos map-based encryption methods have been proposed, taking advantage of their superior properties such as sensibility to the initial state and controlling factors. This encryption technique was founded on the idea of the confusion that the S-implementation boxes alone may generate. The technique involves incorporating replacement box encryption, working with a chaotic map to extract the output data, encrypting that data using a well-known encryption algorithm, and then having the other party decrypt it. And then to ensure the accuracy of the recovered data, certain statistical analysis is performed on it, including correlation, charts, and entropy.
期刊介绍:
The International Journal of Interdisciplinary Telecommunications and Networking (IJITN) examines timely and important telecommunications and networking issues, problems, and solutions from a multidimensional, interdisciplinary perspective for researchers and practitioners. IJITN emphasizes the cross-disciplinary viewpoints of electrical engineering, computer science, information technology, operations research, business administration, economics, sociology, and law. The journal publishes theoretical and empirical research findings, case studies, and surveys, as well as the opinions of leaders and experts in the field. The journal''s coverage of telecommunications and networking is broad, ranging from cutting edge research to practical implementations. Published articles must be from an interdisciplinary, rather than a narrow, discipline-specific viewpoint. The context may be industry-wide, organizational, individual user, or societal. Topics Covered: -Emerging telecommunications and networking technologies -Global telecommunications industry business modeling and analysis -Network management and security -New telecommunications applications, products, and services -Social and societal aspects of telecommunications and networking -Standards and standardization issues for telecommunications and networking -Strategic telecommunications management -Telecommunications and networking cultural issues and education -Telecommunications and networking hardware and software design -Telecommunications investments and new ventures -Telecommunications network modeling and design -Telecommunications regulation and policy issues -Telecommunications systems economics