基于替换盒混沌映射的调查图像密码分析

IF 0.4 Q4 TELECOMMUNICATIONS
Ahmed Rabea, Mohamed Abdelfattah, Ali Takieldeen, Abeer Khalil
{"title":"基于替换盒混沌映射的调查图像密码分析","authors":"Ahmed Rabea, Mohamed Abdelfattah, Ali Takieldeen, Abeer Khalil","doi":"10.21608/ijt.2023.315591","DOIUrl":null,"url":null,"abstract":": Providing a new framework for chaotic image encryption is becoming increasingly important and more significant in various applications, such as the transmission of medical and military photographs. Substitution boxes based on chaos have received a lot of attention lately. Recently, a method of picture encryption based on numerous chaotic Substitution boxes was proposed. Many chaos map-based encryption methods have been proposed, taking advantage of their superior properties such as sensibility to the initial state and controlling factors. This encryption technique was founded on the idea of the confusion that the S-implementation boxes alone may generate. The technique involves incorporating replacement box encryption, working with a chaotic map to extract the output data, encrypting that data using a well-known encryption algorithm, and then having the other party decrypt it. And then to ensure the accuracy of the recovered data, certain statistical analysis is performed on it, including correlation, charts, and entropy.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.4000,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Survey Image Cryptanalysis Using a Substitution Box Based Chaotic Map\",\"authors\":\"Ahmed Rabea, Mohamed Abdelfattah, Ali Takieldeen, Abeer Khalil\",\"doi\":\"10.21608/ijt.2023.315591\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Providing a new framework for chaotic image encryption is becoming increasingly important and more significant in various applications, such as the transmission of medical and military photographs. Substitution boxes based on chaos have received a lot of attention lately. Recently, a method of picture encryption based on numerous chaotic Substitution boxes was proposed. Many chaos map-based encryption methods have been proposed, taking advantage of their superior properties such as sensibility to the initial state and controlling factors. This encryption technique was founded on the idea of the confusion that the S-implementation boxes alone may generate. The technique involves incorporating replacement box encryption, working with a chaotic map to extract the output data, encrypting that data using a well-known encryption algorithm, and then having the other party decrypt it. And then to ensure the accuracy of the recovered data, certain statistical analysis is performed on it, including correlation, charts, and entropy.\",\"PeriodicalId\":42285,\"journal\":{\"name\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2023-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21608/ijt.2023.315591\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interdisciplinary Telecommunications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijt.2023.315591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

本文章由计算机程序翻译,如有差异,请以英文原文为准。
Survey Image Cryptanalysis Using a Substitution Box Based Chaotic Map
: Providing a new framework for chaotic image encryption is becoming increasingly important and more significant in various applications, such as the transmission of medical and military photographs. Substitution boxes based on chaos have received a lot of attention lately. Recently, a method of picture encryption based on numerous chaotic Substitution boxes was proposed. Many chaos map-based encryption methods have been proposed, taking advantage of their superior properties such as sensibility to the initial state and controlling factors. This encryption technique was founded on the idea of the confusion that the S-implementation boxes alone may generate. The technique involves incorporating replacement box encryption, working with a chaotic map to extract the output data, encrypting that data using a well-known encryption algorithm, and then having the other party decrypt it. And then to ensure the accuracy of the recovered data, certain statistical analysis is performed on it, including correlation, charts, and entropy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
27
期刊介绍: The International Journal of Interdisciplinary Telecommunications and Networking (IJITN) examines timely and important telecommunications and networking issues, problems, and solutions from a multidimensional, interdisciplinary perspective for researchers and practitioners. IJITN emphasizes the cross-disciplinary viewpoints of electrical engineering, computer science, information technology, operations research, business administration, economics, sociology, and law. The journal publishes theoretical and empirical research findings, case studies, and surveys, as well as the opinions of leaders and experts in the field. The journal''s coverage of telecommunications and networking is broad, ranging from cutting edge research to practical implementations. Published articles must be from an interdisciplinary, rather than a narrow, discipline-specific viewpoint. The context may be industry-wide, organizational, individual user, or societal. Topics Covered: -Emerging telecommunications and networking technologies -Global telecommunications industry business modeling and analysis -Network management and security -New telecommunications applications, products, and services -Social and societal aspects of telecommunications and networking -Standards and standardization issues for telecommunications and networking -Strategic telecommunications management -Telecommunications and networking cultural issues and education -Telecommunications and networking hardware and software design -Telecommunications investments and new ventures -Telecommunications network modeling and design -Telecommunications regulation and policy issues -Telecommunications systems economics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信