الگوریتم رمزگذاری تصویر جدید بر اساس ترکیب چندجمله ای و تولید تابع پویا
ترجمه نشده

الگوریتم رمزگذاری تصویر جدید بر اساس ترکیب چندجمله ای و تولید تابع پویا

عنوان فارسی مقاله: الگوریتم رمزگذاری تصویر جدید بر اساس ترکیب چندجمله ای نقشه بی نظمی و تولید تابع پویا
عنوان انگلیسی مقاله: A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation
مجله/کنفرانس: پردازش سیگنال - Signal Processing
رشته های تحصیلی مرتبط: مهندسی کامپیوتر
گرایش های تحصیلی مرتبط: مهندسی الگوریتم ها و محاسبات، مهندسی نرم افزار، هوش مصنوعی
کلمات کلیدی فارسی: رمزگذاری تصویر، نقشه بی نظمی 1D، جفتگری چندجمله ای، مولد عدد تصادفی، اثر پروانه ای، تولید تابع پویا
کلمات کلیدی انگلیسی: Image encryption، 1D chaotic maps، Polynomial coupling، Random number generator، Butterfly effect، Dynamic function generation
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.sigpro.2018.11.010
دانشگاه: Department of Computer Engineering, Faculty of Electrical and Computer Engineering, University of Tabriz, Iran
صفحات مقاله انگلیسی: 23
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2019
ایمپکت فاکتور: 3/933 در سال 2017
شاخص H_index: 105 در سال 2019
شاخص SJR: 0/94 در سال 2017
شناسه ISSN: 0165-1684
شاخص Quartile (چارک): Q1 در سال 2017
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: بله
کد محصول: E11141
فهرست مطالب (انگلیسی)

Abstract

1- Introduction

2- Related study

3- Chaotic systems

4- Proposed polynomial chaotic system

5- Proposed image encryption scheme

6- Cryptanalysis of the proposed algorithm

7- Conclusion

References

بخشی از مقاله (انگلیسی)

Abstract

Present paper introduces a polynomial combination of one dimensional chaotic maps that is blended in a dynamic image encryption algorithm. It is special because not only this combination has butterfly folding effect but also it shows generalization property over any polynomial combination. Hence, the butterfly folding effect is caused by governed parameters of polynomial combination. Moreover, multiple simulations and evaluations show the superiority of the proposed chaotic system. An application of this system, which we propose in cryptography, is a novel image encryption algorithm based on dynamic function generation. Compared to the state of the art algorithms, our image encryption algorithm has higher statistical and cryptanalytic properties. Even though this algorithm is not suitable for real-time applications such as streaming video encryption, it makes a good use of the proposed chaotic system. Uppermost cryptanalytic properties that are proven by statistical/numeric tests show good performance and reliability of proposed algorithm for image encryption tasks while unlike any other chaotic image encryption system, our algorithm uses a string input for secret key.

Introduction

This is the rapid growth of network users and data transmits that has led the security researchers to devise much secure infrastructure and cryptographic algorithms. On the other hand, the cryptanalysts have also gained more computing power to put these new inventions to test [1]. Although there are many algorithms that can be used for making a secure data transmit such as AES (Advanced Encryption Algorithm) [2], some successful attacks have been reported to these algorithms; Biclique Cryptanalysis [3] is an example. In cryptography culture, TuxECB effect is a major drawback of these conventional algorithms. Figure 1 shows an inevitable effect happening due to block cipher nature of ECB algorithms like AES. This semantically incorrect cryptographic scheme (along with other problems mentioned earlier) fuels researchers of criteria (e. g. cryptographers) towards more reliable encryption systems and algorithms. Due to their random-like behavior and high statistical scores on various tests such as NIST random number test, correlation analysis and information entropy, chaotic image and media encryption methods have earned so much attention. However, in many aspects, successful attacks on some of these algorithms has been applied and security flaws is reported by various researchers [4–11]. In near future, with increasing higher user interests in social networking (e.g. on websites like Facebook, Insta gram which mostly rely on media as content) mentioned problems can be much more critical. This happens because increase in user generated content needs much secure data transmit that can be decrypted on both sides of transmission line. However, the problem on user side rises as the decrypting device (e. g. mobile phone or a VR glass) lacks com putational and storage resources. This problem can be solved by a fast, secure and easily implementable encryption algorithm that needs no more information rather than the encrypted message and a securely shared secret key. On some study cases, researchers used another image called as key-image for secret key to ensure this security but the employed methodology increases data transition by a factor of ×2.