N. A. Mohamed, M. A. El-Azeim, Alaa Zaghloul, A. El-latif
{"title":"基于三维猫图和图灵机的安全数字图像加密方案","authors":"N. A. Mohamed, M. A. El-Azeim, Alaa Zaghloul, A. El-latif","doi":"10.1109/SOCPAR.2015.7492812","DOIUrl":null,"url":null,"abstract":"In present time, in order to provide security of multimedia data while transmission and storage processes, the protection of image data can be accomplished using encryption. This paper presents a new image encryption scheme relaying on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The proposed technique composed of two processes of pixels' locations confusion using a chaotic 3D cat map, which is performed concurrently with substituting values swapping pixels' locations using Turing machine. The generated key is dependent on the plain image, to resist the chosen plaintext attack. Both experimental and security analysis show that the presented technique can achieve a large key space and resist the common against cipher attacks. These good cryptographic advantages make it suitable for image transmission over network.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Image encryption scheme for secure digital images based on 3D cat map and Turing machine\",\"authors\":\"N. A. Mohamed, M. A. El-Azeim, Alaa Zaghloul, A. El-latif\",\"doi\":\"10.1109/SOCPAR.2015.7492812\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In present time, in order to provide security of multimedia data while transmission and storage processes, the protection of image data can be accomplished using encryption. This paper presents a new image encryption scheme relaying on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The proposed technique composed of two processes of pixels' locations confusion using a chaotic 3D cat map, which is performed concurrently with substituting values swapping pixels' locations using Turing machine. The generated key is dependent on the plain image, to resist the chosen plaintext attack. Both experimental and security analysis show that the presented technique can achieve a large key space and resist the common against cipher attacks. These good cryptographic advantages make it suitable for image transmission over network.\",\"PeriodicalId\":409493,\"journal\":{\"name\":\"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)\",\"volume\":\"104 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOCPAR.2015.7492812\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOCPAR.2015.7492812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image encryption scheme for secure digital images based on 3D cat map and Turing machine
In present time, in order to provide security of multimedia data while transmission and storage processes, the protection of image data can be accomplished using encryption. This paper presents a new image encryption scheme relaying on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The proposed technique composed of two processes of pixels' locations confusion using a chaotic 3D cat map, which is performed concurrently with substituting values swapping pixels' locations using Turing machine. The generated key is dependent on the plain image, to resist the chosen plaintext attack. Both experimental and security analysis show that the presented technique can achieve a large key space and resist the common against cipher attacks. These good cryptographic advantages make it suitable for image transmission over network.