基于替换盒混沌映射的调查图像密码分析

Ahmed Rabea, Mohamed Abdelfattah, Ali Takieldeen, Abeer Khalil
{"title":"基于替换盒混沌映射的调查图像密码分析","authors":"Ahmed Rabea, Mohamed Abdelfattah, Ali Takieldeen, Abeer Khalil","doi":"10.21608/ijt.2023.315591","DOIUrl":null,"url":null,"abstract":": Providing a new framework for chaotic image encryption is becoming increasingly important and more significant in various applications, such as the transmission of medical and military photographs. Substitution boxes based on chaos have received a lot of attention lately. Recently, a method of picture encryption based on numerous chaotic Substitution boxes was proposed. Many chaos map-based encryption methods have been proposed, taking advantage of their superior properties such as sensibility to the initial state and controlling factors. This encryption technique was founded on the idea of the confusion that the S-implementation boxes alone may generate. The technique involves incorporating replacement box encryption, working with a chaotic map to extract the output data, encrypting that data using a well-known encryption algorithm, and then having the other party decrypt it. And then to ensure the accuracy of the recovered data, certain statistical analysis is performed on it, including correlation, charts, and entropy.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.4000,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Survey Image Cryptanalysis Using a Substitution Box Based Chaotic Map\",\"authors\":\"Ahmed Rabea, Mohamed Abdelfattah, Ali Takieldeen, Abeer Khalil\",\"doi\":\"10.21608/ijt.2023.315591\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Providing a new framework for chaotic image encryption is becoming increasingly important and more significant in various applications, such as the transmission of medical and military photographs. Substitution boxes based on chaos have received a lot of attention lately. Recently, a method of picture encryption based on numerous chaotic Substitution boxes was proposed. Many chaos map-based encryption methods have been proposed, taking advantage of their superior properties such as sensibility to the initial state and controlling factors. This encryption technique was founded on the idea of the confusion that the S-implementation boxes alone may generate. The technique involves incorporating replacement box encryption, working with a chaotic map to extract the output data, encrypting that data using a well-known encryption algorithm, and then having the other party decrypt it. And then to ensure the accuracy of the recovered data, certain statistical analysis is performed on it, including correlation, charts, and entropy.\",\"PeriodicalId\":42285,\"journal\":{\"name\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2023-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21608/ijt.2023.315591\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interdisciplinary Telecommunications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijt.2023.315591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Survey Image Cryptanalysis Using a Substitution Box Based Chaotic Map
: Providing a new framework for chaotic image encryption is becoming increasingly important and more significant in various applications, such as the transmission of medical and military photographs. Substitution boxes based on chaos have received a lot of attention lately. Recently, a method of picture encryption based on numerous chaotic Substitution boxes was proposed. Many chaos map-based encryption methods have been proposed, taking advantage of their superior properties such as sensibility to the initial state and controlling factors. This encryption technique was founded on the idea of the confusion that the S-implementation boxes alone may generate. The technique involves incorporating replacement box encryption, working with a chaotic map to extract the output data, encrypting that data using a well-known encryption algorithm, and then having the other party decrypt it. And then to ensure the accuracy of the recovered data, certain statistical analysis is performed on it, including correlation, charts, and entropy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
27
期刊介绍: The International Journal of Interdisciplinary Telecommunications and Networking (IJITN) examines timely and important telecommunications and networking issues, problems, and solutions from a multidimensional, interdisciplinary perspective for researchers and practitioners. IJITN emphasizes the cross-disciplinary viewpoints of electrical engineering, computer science, information technology, operations research, business administration, economics, sociology, and law. The journal publishes theoretical and empirical research findings, case studies, and surveys, as well as the opinions of leaders and experts in the field. The journal''s coverage of telecommunications and networking is broad, ranging from cutting edge research to practical implementations. Published articles must be from an interdisciplinary, rather than a narrow, discipline-specific viewpoint. The context may be industry-wide, organizational, individual user, or societal. Topics Covered: -Emerging telecommunications and networking technologies -Global telecommunications industry business modeling and analysis -Network management and security -New telecommunications applications, products, and services -Social and societal aspects of telecommunications and networking -Standards and standardization issues for telecommunications and networking -Strategic telecommunications management -Telecommunications and networking cultural issues and education -Telecommunications and networking hardware and software design -Telecommunications investments and new ventures -Telecommunications network modeling and design -Telecommunications regulation and policy issues -Telecommunications systems economics
期刊最新文献
Research on 5G User Perception Detection and Experience Improvement Optimization Based on Capsule Network Research on 5G User Perception Detection and Experience Improvement Optimization Based on Capsule Network Enhancing community interaction for the Deaf and Dumb via the design and implementation of Smart Speaking Glove (SSG) Based on Embedded System Design and Implementation of a Diagnostic Solid Propellant Fuel System Based on Laser Illuminator Interior design applications based on IoT as detection and es-timation methods
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1