{"title":"An Improved Lossy-Encryption System for Still-Image Data Based on the Quaternion Multiplication and Robust Chaos","authors":"Imad El Hanouti, Hakim El Fadili, Mohamed Boussif","doi":"10.1145/3454127.3456572","DOIUrl":null,"url":null,"abstract":"In this paper, we propose an improved lossy-encryption system based on a previously vulnerable one. The original system is first analyzed for potential drawbacks, and then a new system with enhanced security level is proposed. The main strength points of our proposed system reside in the key generation which is based on robust chaos and a fast hashing scheme, and the lossy property of the scheme which contributes to make a good diffusion and confusion. Security analysis shows that the system possesses good statistical properties and it can resist the discussed attacks.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3454127.3456572","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, we propose an improved lossy-encryption system based on a previously vulnerable one. The original system is first analyzed for potential drawbacks, and then a new system with enhanced security level is proposed. The main strength points of our proposed system reside in the key generation which is based on robust chaos and a fast hashing scheme, and the lossy property of the scheme which contributes to make a good diffusion and confusion. Security analysis shows that the system possesses good statistical properties and it can resist the discussed attacks.