Ayman Mousa, El-Sayed M. El-Rabaie, E. Nigm, O. Faragallah
{"title":"基于混沌映射的图像密码系统数据库安全","authors":"Ayman Mousa, El-Sayed M. El-Rabaie, E. Nigm, O. Faragallah","doi":"10.1109/JEC-ECC.2013.6766404","DOIUrl":null,"url":null,"abstract":"Chaos in cryptography is of huge interest in many areas such as databases, e-business, and security of communication channels, in order to preserve sensible data from attacks of unauthorized persons. The chaotic maps are becoming increasingly popular in real-time image encryption/ decryption systems for its high security, speed, computational overheads. In this paper we apply two processes: chaotic confusion and diffusion of the pixel values, which provide images cryptosystem of the databases based on chaotic maps. It is implemented by development our database encryption simulation in a previous work done by the authors. This developing conforms by adding chaotic standard and henon map in our simulation. Examining its implementation for image encryption based on chaotic maps along with its detailed performance evaluation and security analysis. Experimental results demonstrate that the image cryptosystem has satisfactory efficient and very secure, which makes it a possible candidate for images encryption in the databases.","PeriodicalId":379820,"journal":{"name":"2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Images cryptosystem based on chaotic maps for databases security\",\"authors\":\"Ayman Mousa, El-Sayed M. El-Rabaie, E. Nigm, O. Faragallah\",\"doi\":\"10.1109/JEC-ECC.2013.6766404\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Chaos in cryptography is of huge interest in many areas such as databases, e-business, and security of communication channels, in order to preserve sensible data from attacks of unauthorized persons. The chaotic maps are becoming increasingly popular in real-time image encryption/ decryption systems for its high security, speed, computational overheads. In this paper we apply two processes: chaotic confusion and diffusion of the pixel values, which provide images cryptosystem of the databases based on chaotic maps. It is implemented by development our database encryption simulation in a previous work done by the authors. This developing conforms by adding chaotic standard and henon map in our simulation. Examining its implementation for image encryption based on chaotic maps along with its detailed performance evaluation and security analysis. Experimental results demonstrate that the image cryptosystem has satisfactory efficient and very secure, which makes it a possible candidate for images encryption in the databases.\",\"PeriodicalId\":379820,\"journal\":{\"name\":\"2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JEC-ECC.2013.6766404\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JEC-ECC.2013.6766404","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Images cryptosystem based on chaotic maps for databases security
Chaos in cryptography is of huge interest in many areas such as databases, e-business, and security of communication channels, in order to preserve sensible data from attacks of unauthorized persons. The chaotic maps are becoming increasingly popular in real-time image encryption/ decryption systems for its high security, speed, computational overheads. In this paper we apply two processes: chaotic confusion and diffusion of the pixel values, which provide images cryptosystem of the databases based on chaotic maps. It is implemented by development our database encryption simulation in a previous work done by the authors. This developing conforms by adding chaotic standard and henon map in our simulation. Examining its implementation for image encryption based on chaotic maps along with its detailed performance evaluation and security analysis. Experimental results demonstrate that the image cryptosystem has satisfactory efficient and very secure, which makes it a possible candidate for images encryption in the databases.