دانلود و نمایش مقالات مرتبط با رمزنگاری هرج و مرج::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - رمزنگاری هرج و مرج

تعداد مقالات یافته شده: 3
ردیف عنوان نوع
1 An efficient colour image encryption scheme based on 1-D chaotic maps
یک طرح رمزگذاری کارآمد تصویر بر اساس نگاشت های هرج و مرج 1 بعدی-2019
Nowadays, internet is the medium through which people are sharing digital images. However, security is an issue in sharing of those images. Encryption techniques play an important role for the security of images. In this paper, an efficient colour image encryption scheme is proposed using multiple piece-wise linear chaotic map (PWLCM) systems. The proposed scheme first performs two-times multi-way block- based rotational permutation operations and then row-column rotational permutations. Finally, it per- forms row, column, and block diffusion operations. This scheme is simple and secure because it involves only simple rotational permutation operations using only PWLCM systems. Also, this scheme is efficient because it requires less computations and less simulation time to encrypt colour images. The advantages of this scheme are high key space, high security, simplicity and high efficiency in terms of computational complexity and simulation time. The simulation outputs and the security analyses indicate that the pro- posed method has better performance in terms of encryption efficiency, security, and resistivity for most of the common attacks.
Keywords: Security | Chaotic cryptography | Colour image encryption | Rotational permutation operation | PWLCM system | Efficiency | Key space
مقاله انگلیسی
2 On symmetric color image encryption system with permutation-diffusion simultaneous operation
سیستم رمزگذاری تصویر رنگی متقارن با عملکرد همزمان نفوذ جایگشتی-2019
In the traditional image encryption systems, the permutation-diffusion operation is often conducted in two es- sentially separable or independent steps, which appears not only to be inefficient but also vulnerable in being attacked since each step can be targeted separately. In this paper, we propose a new plaintext-related cryptosys- tem in which the permutation-diffusion operation is performed in a simultaneous manner. More specifically, the simultaneous permutation-diffusion operation (PDSO) leads to the confusion and diffusion interacted each other, and thus generates better security level as well as higher efficiency of encryption process. The proposed encryp- tion scheme only requires a single PDSO in the corresponding encryption process, in which the first encrypted pixel’s position in cipher image is randomly chosen and its value is determined by both pixels in the original image and the elements in key-streams obtained by three one-dimensional chaotic mappings, and the current encrypting pixel’s value is set to be associated with the previous encrypted pixel. Under our framework, the proposed encryption scheme is highly sensitive to minor differences in both secret key and plain image, result- ing in resisting chosen/known plaintext attacks effectively. Simulation results show that the proposed scheme demonstrates excellent security capacity with high efficiency, comparing with existing approaches in literature.
Keywords: Chaotic mapping | Permutation-diffusion | Image security | Chaotic cryptography | Chaotic dynamics
مقاله انگلیسی
3 Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion
رمزنگاری و بهبود رمزگذاری تصویر پزشکی با استفاده از سرعت بالا و انتشار تطبیقی پیکسلی-2019
A medical image encryption algorithm using high-speed scrambling and pixel adaptive diffusion was re- cently proposed by Hua et al. The algorithm mainly consists of random data insertion, high-speed scram- bling, and pixel adaptive diffusion. Before performing the scrambling-diffusion process, external random pixels are inserted into the surrounding plain image. Then, high-speed scrambling and pixel adaptive diffusion are respectively used to randomly shuffle adjacent pixels and spread them throughout the ci- pher image. The authors claim that this scheme can achieve both high efficiency and strong robustness. However, under bad randomness, we have found that the cipher image can be completely recovered by using a chosen plain image attack. To increase resistance against such attacks, we propose an improved encryption scheme that performs nonlinear operations on permuted images using an enhanced version of the original algorithm. Experimental results and security analysis show that our improved encryption algorithm can not only resist chosen plain image attacks but also maintain the merits of the original algorithm.
Keywords: Chaotic cryptography | Cryptanalysis | Chosen plain image attack
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 12576 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 12576 :::::::: افراد آنلاین: 59