A robust and efficient scheme for image encryption-decryption

Size: px
Start display at page:

Download "A robust and efficient scheme for image encryption-decryption"

Transcription

1 A robust and efficient scheme for image encryption-decryption Prerana Sharma 1, Dr. Shiv Kumar 1 M.Tech. Scholar, ACEIT, Kukas, Jaipur (Raj.), India Professor, ACEIT, Kukas, Jaipur (Raj.), India ABSTRACT Fractional Fourier transform and chaos functions play a key role in many of encryption-decryption algorithms. In this work performance of image encryption-decryption algorithms is quantified and compared using the resemblance of input image to the restored image, quantified by MSE. This work verifies robustness of the proposed image encryption-decryption algorithms. Further, simulations are performed using MATLAB7.7 to quantify performance of the proposed algorithms using MSE. The results obtained in these simulations prove that for the proposed algorithms MSE between restored and original images has a very high value, if decrypted at an incorrect thereby maintaining the robustness of the algorithms. These algorithms are found sensitive to a variation of 1x10-1 in the fractional orders used in encryption-decryption process. Keywords: Fractional Fourier Transform, Discrete Wavelet Transform, Tent map, Robust algorithm, Computation Complexity. 1. INTRODUCTION Optical systems process -dimensional complex data in parallel and at a high speed. Therefore, these systems are of growing interest for image encryption. Many optical methods have been proposed in past [1] [] [3] [4] [5] [6] [7]. Double random phase encoding as presented in [1], [4] has been widely used and remains highly successful. The fractional Fourier transform also has been potentially used in the field of optical security [] [3] [4] [5] [7].. FRACTIONAL FOURIER TRANSFORM The a th order fractional Fourier transform is a linear operation defined by the integral K a f u K u, u' f u' du' u, u' A expi cot u cscuu' cotu' 1 icot Volume, Issue 5, May 013 Page 436 A a When a j and K a (u, u ) Ξ (u u ) when a = 4j and K a (u,u )Ξ (u + u ) when a = 4j±, where j is an integer. The a th order transform is sometimes referred to as the th order transform [7]. 3. CHAOS FUNCTIONS Chaos functions have been mainly used to develop the mathematical models of non-linear systems. These functions generate completely random iterative values. But these values are limited between bounds. Convergence of the iterative values after any value of iterations is kept hidden. Chaos functions are sensitive to the initial conditions. Three chaos functions are discussed below: (a) The first chaos function is the logistic map [8] and is defined as: p. x.(1 x) This function is bounded for 0 < p < 4 and can be written in the iterative form as: x p. x.(1 x n 1 n n with x 0 as the initial value. This is also known as the seed value for the chaos function. (b) The second chaos function is the tent map [8] and is defined as: a. x 0 x0 0.5 a.(1 x) 0.5 x0 1 This function is bounded for 0< a and can be written in the iterative form as: )

2 a. xn 0 x0 0.5 xn 1 a.(1 xn ) 0.5 x0 1 with x 0 as the initial value. (c) The third chaos function is the Kaplan Yorke map [8] and is defined as: a. x.mod1 0 x0 0.5 f ( by cos(4x) 0.5 x0 1 This is bounded for 0 a and 0 b 1 and can be written in the iterative form as: x a. x mod1 y n 1 n by cos(4x n 1 n n with x 0 as the initial value. These chaos functions are used to generate random phase masks. Logistic map and tent map are one-dimensional chaos functions and the Kaplan Yorke map is a two-dimensional chaos function. For the two-dimensional chaos function, two seed values are required to generate the CRPM (Chaotic random phase mask). 4. PROPOSED SCHEME Here we are considering that an image I = f(x, of size MXN consists of three primary color channels viz. RED, GREEN and BLUE. For simplicity, we assume the image size to be N X N. As presented in [1], the image encryption and decryption algorithms in this work are based on the Discrete Wavelet Transform, fractional Fourier transform and use chaotic logistic map, Tent map and Kaplan-Yorke map. These algorithms shall be further referred as Algorithm 1, Algorithm and Algorithm 3 respectively throughout the paper. Each of these algorithms follows a similar sequence of operations but they differ in their implementation details. A general overview of the encryption and decryption process is as follows. For an input image 3 I f i1 The encryption process of I produces I 1 as below [1] I g( x, IDWT F F DWT,, i x, y, where1 x, y N ) f ( x, *expi S1( x, *expi S ( x, i 1 where α, β, γ, δ denote orders of the fractional Fourier transform. The decryption of I 1 is carried out as per the following formulae [1] ' ' I f x, IDWT F, F, DWT g ( x, * conjexpi S ( x, * conjexp i S ( x, ( 1 -α, -β, -γ and δ denote fractional orders used for decryption. 5. SIMULATION RESULTS In order to investigate the quality of encryption, decryption i.e. robustness of proposed algorithms, digital simulations were performed in an environment as under: Processor Intel Core i3 CPU, M380.53GHz. RAM 3.00 GB. Operating System 64-bit Windows 7. Simulation tool MATLAB R008b. Fig 1 Input image to algorithm 1, and 3(Lena.tif, 56X56, color). Volume, Issue 5, May 013 Page 437

3 The input image chosen for analysis is Lena (TIFF image; Size = 193 KB; pixel by pixel resolution = 56X56) as shown in Fig 1. Lena was encrypted using algorithm 1, and 3 for α = β = γ = δ = 0.5 fractional orders of FRT. The resulting encrypted images obtained after application of algorithm 1, and 3 are shown in Fig (a), (b) and (c) respectively. These images can be decrypted on any fractional order of FRT, but the restored image may differ from the input image depending on the order of FRT. The decrypted images obtained using incorrect fractional orders α = β = γ = δ = 0.49 and α = β = γ = δ = 0.51 of inverse FRT are shown in Fig 3(a) 3(c) and Fig 4(a) Fig 4(c). Fig. 5(a) - 5(c) show decrypted images obtained when correct fractional orders of inverse FRT are used i.e. α = β = γ = δ = Fig. Images encrypted at α = β = γ = δ = 0.5 using (a) Algorithm 1, (b) Algorithm and (c) Algorithm 3. Fig 3. Images decrypted at α = β = γ = δ = using (a) Algorithm 1, (b) Algorithm and (c) Algorithm 3. Fig 4. Images decrypted at α = β = γ = δ = using (a) Algorithm 1, (b) Algorithm and (c) Algorithm 3. Fig 5. Images decrypted at α = β = γ = δ = 0.5 using (a) Algorithm 1, (b) Algorithm and (c) Algorithm 3. Volume, Issue 5, May 013 Page 438

4 (a) (b) (c) Fig 6. Graph, showing MSE between input image and decrypted image using (a) Algorithm 1, (b) Algorithm and (c) Algorithm 3. The order of decryption ranging between Fig 6(a) 6(c) show the variation of MSE between decrypted (restored from the encrypted) image and the input image at different fractional orders. From the graphs it is observed that the MSE value at α = β = γ = δ = orders of decryption is much higher than MSE value at α = β = γ = δ = -0.5 orders of decryption. This ratio of these MSEs is of the order of 10 9, which can be observed from the graph. 6. CONCLUSION From the results shown in previous section, the algorithms presented in this work are found to be robust in nature. The algorithms are sensitive to a variation of fractional order which is of the order of Besides this, these algorithms are efficient also [1]. Due to their efficient and robust behavior, the algorithms may find various applications. References [1.] P. Sharma, D. Mishra, A. Agarwal, Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform, SIN 1, pp , October 01. [.] M. Joshi, Chandrashakhar, K. Singh, Color image encryption and decryption using fractional fourier transform, Optics communications, Vol. 79 Issue 1, pp 35-4, 1 November 007. Volume, Issue 5, May 013 Page 439

5 [3.] N. Singh, A. Sinha, Optical image encryption using fractional Fourier transform and chaos, Optics and Lasers in Engineering, Vol. 46 Issue, pp , February 008. [4.] R. Tao, Y. Xin, Y. Wang, Double image encryption based on random phase encoding in the fractional fourier domain, Optics Express, Vol. 15 Issue 4, 007, pp [5.] B. M. Hennelly, J. T. Sheridan, Image encryption and the fractional Fourier transform, Optik - International Journal for Light and Electron Optics, Volume 114 Issue 6, 003, pp [6.] C. H. Chuang, G. Lin, Data steganography for optical color image cryptosystems, International Journal of Image Processing (IJIP), Vol 3 Issue 6, January 010, pp [7.] H. M. Ozaktas, M. AlperKutay, Z. Zalevsky, The fractional Fourier transform: with applications in optics and signal processing, New York, John Wiley & Sons, 001. [8.] R. C. Alligood, T. D. Sauer, J. A. Yorke, Chaos; an introduction to dynamical systems, New York, Springer, 001 Volume, Issue 5, May 013 Page 440

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid

More information

Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key

Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key Home Search Collections Journals About Contact us My IOPscience Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm This content has been downloaded

More information

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System entropy Article A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System Hegui Zhu 1, *, Xiangde Zhang 1, Hai Yu 2, Cheng Zhao 3 and Zhiliang Zhu 2 1 College of Sciences, Northeastern

More information

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 5, September 2017 The Method of Obtaining Best Unary Polynomial for the Chaotic

More information

Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform

Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform Efficient Image Encrption and Decrption Using Discrete Wavelet Transform and Fractional Fourier Transform A Dissertation submitted in partial fulfillment for the award of the Degree of Master of Technolog

More information

Image Encryption Using Block Based Transformation With Fractional Fourier Transform

Image Encryption Using Block Based Transformation With Fractional Fourier Transform 2013 8th International Conference on Communications and Networking in China (CHINACOM) Image Encryption Using Block Based Transformation With Fractional Fourier Transform Delong Cui 1,2, Lei Shu 2, Yuanfang

More information

Multi-Map Orbit Hopping Chaotic Stream Cipher

Multi-Map Orbit Hopping Chaotic Stream Cipher Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum

More information

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 24 CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 3.1 INTRODUCTION Pseudo Random Number Generators (PRNGs) are widely used in many applications, such as numerical analysis, probabilistic

More information

Eric G. Johnson: Diffractive and Micro-Optical Systems. Justin Coleman. College of Optical Sciences. The University of Arizona

Eric G. Johnson: Diffractive and Micro-Optical Systems. Justin Coleman. College of Optical Sciences. The University of Arizona Eric G. Johnson: Diffractive and Micro-Optical Systems Justin Coleman College of Optical Sciences The University of Arizona jcoleman@email.arizona.edu Abstract The material discussed in this paper relates

More information

Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption

Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption Efficient and Singular Value ecomposition based Chaotic Encryption Ashraf Afifi epartment of Computer Engineering Computers and Information Technology college Taif University, Al-Hawiya 974, Kingdom of

More information

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw

More information

Example Chaotic Maps (that you can analyze)

Example Chaotic Maps (that you can analyze) Example Chaotic Maps (that you can analyze) Reading for this lecture: NDAC, Sections.5-.7. Lecture 7: Natural Computation & Self-Organization, Physics 256A (Winter 24); Jim Crutchfield Monday, January

More information

Spread-space spread-spectrum technique for secure multiplexing. Optics Letters, 32 (9):

Spread-space spread-spectrum technique for secure multiplexing. Optics Letters, 32 (9): Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Author(s) Publication date Spread-space spread-spectrum

More information

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith Abstract Generating random numbers are mainly used to create secret keys or random

More information

Chaos and Cryptography

Chaos and Cryptography Chaos and Cryptography Vishaal Kapoor December 4, 2003 In his paper on chaos and cryptography, Baptista says It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property

More information

Ing. Amilcare Francesco Santamaria, Ph.D. DIMES Dpt. University of Calabria

Ing. Amilcare Francesco Santamaria, Ph.D. DIMES Dpt. University of Calabria DES Algorithm works on bit or binary number, this mean that if we have to face with an HEX number such as 1 it needs to be converted in a binary number: 1 hex = 0001 (4 bits 1 nibble) 9 hex = 1001 A hex

More information

Design of S-Box using Combination of Chaotic Functions

Design of S-Box using Combination of Chaotic Functions 129 Design of S-Box using Combination of Chaotic Functions Tanu Wadhera 1, Gurmeet Kaur 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2 Department of Electronics

More information

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST IGOR BELI^, ALEKSANDER PUR NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST There are several problems where it is very important to know whether the tested data are distributed according to the

More information

Cryptanalysis of a computer cryptography scheme based on a filter bank

Cryptanalysis of a computer cryptography scheme based on a filter bank NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in August 2007. Changes resulting from the publishing process, such as peer review, editing, corrections,

More information

Discrete Wavelet Transform: A Technique for Image Compression & Decompression

Discrete Wavelet Transform: A Technique for Image Compression & Decompression Discrete Wavelet Transform: A Technique for Image Compression & Decompression Sumit Kumar Singh M.Tech Scholar, Deptt. of Computer Science & Engineering Al-Falah School of Engineering & Technology, Faridabad,

More information

Homomorphic Encryption. Liam Morris

Homomorphic Encryption. Liam Morris Homomorphic Encryption Liam Morris Topics What Is Homomorphic Encryption? Partially Homomorphic Cryptosystems Fully Homomorphic Cryptosystems Benefits of Homomorphism Drawbacks of Homomorphism What Is

More information

Empirical Analysis of Invariance of Transform Coefficients under Rotation

Empirical Analysis of Invariance of Transform Coefficients under Rotation International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 5 (May 25), PP.43-5 Empirical Analysis of Invariance of Transform Coefficients

More information

RSA ENCRYPTION USING THREE MERSENNE PRIMES

RSA ENCRYPTION USING THREE MERSENNE PRIMES Int. J. Chem. Sci.: 14(4), 2016, 2273-2278 ISSN 0972-768X www.sadgurupublications.com RSA ENCRYPTION USING THREE MERSENNE PRIMES Ch. J. L. PADMAJA a*, V. S. BHAGAVAN a and B. SRINIVAS b a Department of

More information

Video Compression-Encryption using Three Dimensional Discrete Fractional Transforms

Video Compression-Encryption using Three Dimensional Discrete Fractional Transforms Research Journal of Applied Sciences, Engineering and Technology 5(14): 3678-3683, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: June 23, 212 Accepted: July 28, 212

More information

Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications

Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications Australian Journal of Basic and Applied Sciences, 4(7): 1691-1698, 2010 ISSN 1991-8178 Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications

More information

No. 6 Determining the input dimension of a To model a nonlinear time series with the widely used feed-forward neural network means to fit the a

No. 6 Determining the input dimension of a To model a nonlinear time series with the widely used feed-forward neural network means to fit the a Vol 12 No 6, June 2003 cfl 2003 Chin. Phys. Soc. 1009-1963/2003/12(06)/0594-05 Chinese Physics and IOP Publishing Ltd Determining the input dimension of a neural network for nonlinear time series prediction

More information

arxiv:nlin/ v1 [nlin.cd] 10 Aug 2006

arxiv:nlin/ v1 [nlin.cd] 10 Aug 2006 Cryptanalysis of a chaotic block cipher with external key and its improved version arxiv:nlin/0608020v1 [nlin.cd] 10 Aug 2006 Chengqing Li a,, Shujun Li b,, Gonzalo Álvarezc, Guanrong Chen a and Kwok-Tung

More information

Breaking an encryption scheme based on chaotic Baker map

Breaking an encryption scheme based on chaotic Baker map Breaking an encryption scheme based on chaotic Baker map Gonzalo Alvarez a, and Shujun Li b a Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144 28006 Madrid, Spain

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

From Fourier Series to Analysis of Non-stationary Signals - II

From Fourier Series to Analysis of Non-stationary Signals - II From Fourier Series to Analysis of Non-stationary Signals - II prof. Miroslav Vlcek October 10, 2017 Contents Signals 1 Signals 2 3 4 Contents Signals 1 Signals 2 3 4 Contents Signals 1 Signals 2 3 4 Contents

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

Gurgen Khachatrian Martun Karapetyan

Gurgen Khachatrian Martun Karapetyan 34 International Journal Information Theories and Applications, Vol. 23, Number 1, (c) 2016 On a public key encryption algorithm based on Permutation Polynomials and performance analyses Gurgen Khachatrian

More information

Co-existence of Regular and Chaotic Motions in the Gaussian Map

Co-existence of Regular and Chaotic Motions in the Gaussian Map EJTP 3, No. 13 (2006) 29 40 Electronic Journal of Theoretical Physics Co-existence of Regular and Chaotic Motions in the Gaussian Map Vinod Patidar Department of Physics, Banasthali Vidyapith Deemed University,

More information

A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic

A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic International Journal of Network Security, Vol.19, No.3, PP.347-357, May 2017 (DOI: 10.6633/IJNS.201703.19(3).04) 347 A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic Hui

More information

Cryptanalysis of a Multistage Encryption System

Cryptanalysis of a Multistage Encryption System Cryptanalysis of a Multistage Encryption System Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China Software Engineering

More information

Analysis and Comparison of One Dimensional Chaotic Map Functions

Analysis and Comparison of One Dimensional Chaotic Map Functions Analysis and Comparison of One Dimensional Chaotic Map Functions Tanu Wadhera 1, Gurmeet Kaur 2 1,2 ( Punjabi University, Patiala, Punjab, India) Abstract : Chaotic functions because of their complexity

More information

New Chaotic Permutation Methods for Image Encryption

New Chaotic Permutation Methods for Image Encryption IAENG International Journal of Computer Science, 37:4, IJCS_37_4_ New Chaotic Permutation Methods for Image Encryption Abir Awad, Abdelhakim Saadane 2 Abstract Since two decades, and in order to reach

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

Classification of Hand-Written Digits Using Scattering Convolutional Network

Classification of Hand-Written Digits Using Scattering Convolutional Network Mid-year Progress Report Classification of Hand-Written Digits Using Scattering Convolutional Network Dongmian Zou Advisor: Professor Radu Balan Co-Advisor: Dr. Maneesh Singh (SRI) Background Overview

More information

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers presented by Goutam Sen Research Scholar IITB Monash Research Academy. 1 Agenda: Introduction to Stream Ciphers

More information

Intelligent Handwritten Digit Recognition using Artificial Neural Network

Intelligent Handwritten Digit Recognition using Artificial Neural Network RESEARCH ARTICLE OPEN ACCESS Intelligent Handwritten Digit Recognition using Artificial Neural Networ Saeed AL-Mansoori Applications Development and Analysis Center (ADAC), Mohammed Bin Rashid Space Center

More information

Further improving security of Vector Stream Cipher

Further improving security of Vector Stream Cipher NOLTA, IEICE Paper Further improving security of Vector Stream Cipher Atsushi Iwasaki 1a) and Ken Umeno 2 1 Fukuoka Institute of Technology Wajiro-higashi, Higashiku, Fukuoka 811-0295, Japan 2 Graduate

More information

Turbulence and Devaney s Chaos in Interval

Turbulence and Devaney s Chaos in Interval Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 2 (2017), pp. 713-717 Research India Publications http://www.ripublication.com Turbulence and Devaney s Chaos in Interval

More information

A Secure Chaos-based Image Cryptosystem with an Improved Sine Key Generator

A Secure Chaos-based Image Cryptosystem with an Improved Sine Key Generator American Journal of Signal Processing 206, 6(3): 67-76 DOI: 0.5923/j.ajsp.2060603.0 A Secure Chaos-based Image Cryptosystem with an Improved Sine Key Generator Hidayet Oğraş,*, Mustafa Türk 2 Department

More information

An Efficient Image Encryption Algorithm for the Period of Arnold's CAT Map

An Efficient Image Encryption Algorithm for the Period of Arnold's CAT Map International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper An Efficient Image

More information

A novel pseudo-random number generator based on discrete chaotic iterations

A novel pseudo-random number generator based on discrete chaotic iterations A novel pseudo-random number generator based on discrete chaotic iterations Qianxue Wang, Christophe Guyeux and Jacques M. Bahi University of Franche-Comte Computer Science Laboratory LIFC, Belfort, France

More information

Introduction to Cryptography

Introduction to Cryptography Introduction to Cryptography by Dr. Deep Singh Department of Mathematics, Central University of Jammu, Jammu Outline Introduction to Number Theory Classification of Numbers Various results Introduction

More information

Elliptic Curve Cryptography and Security of Embedded Devices

Elliptic Curve Cryptography and Security of Embedded Devices Elliptic Curve Cryptography and Security of Embedded Devices Ph.D. Defense Vincent Verneuil Institut de Mathématiques de Bordeaux Inside Secure June 13th, 2012 V. Verneuil - Elliptic Curve Cryptography

More information

Computing the Signal Duration to Minimize Average Waiting Time using Round Robin Algorithm

Computing the Signal Duration to Minimize Average Waiting Time using Round Robin Algorithm Volume 4, No. 6, June 2013 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info Computing the Signal Duration to Minimize Average Waiting Time using Round Robin

More information

Hands-on Generating Random

Hands-on Generating Random CVIP Laboratory Hands-on Generating Random Variables Shireen Elhabian Aly Farag October 2007 The heart of Monte Carlo simulation for statistical inference. Generate synthetic data to test our algorithms,

More information

Fourier Transforms 1D

Fourier Transforms 1D Fourier Transforms 1D 3D Image Processing Alireza Ghane 1 Overview Recap Intuitions Function representations shift-invariant spaces linear, time-invariant (LTI) systems complex numbers Fourier Transforms

More information

Digital Secure-Communication Using Robust Hyper-Chaotic Systems

Digital Secure-Communication Using Robust Hyper-Chaotic Systems Digital Secure-Communication Using Robust Hyper-Chaotic Systems Shih-Liang Chen Shu-Ming Chang Wen-Wei Lin Ting-Ting Hwang Abstract In this paper, we propose a robust hyper-chaotic system that is practically

More information

Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography

Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography P. Sanoop Kumar Department of CSE, Gayatri Vidya Parishad College of Engineering(A), Madhurawada-530048,Visakhapatnam,

More information

C3 Revision Questions. (using questions from January 2006, January 2007, January 2008 and January 2009)

C3 Revision Questions. (using questions from January 2006, January 2007, January 2008 and January 2009) C3 Revision Questions (using questions from January 2006, January 2007, January 2008 and January 2009) 1 2 1. f(x) = 1 3 x 2 + 3, x 2. 2 ( x 2) (a) 2 x x 1 Show that f(x) =, x 2. 2 ( x 2) (4) (b) Show

More information

Fractional wavelet transform

Fractional wavelet transform Fractional wavelet transform David Mendlovic, Zeev Zalevsky, David Mas, Javier García, and Carlos Ferreira The wavelet transform, which has had a growing importance in signal and image processing, has

More information

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding International Journal on Advances in Security, vol 4 no &, year, http://www.iariajournals.org/security/ Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding 8 Jacques

More information

One-way Hash Function Based on Neural Network

One-way Hash Function Based on Neural Network One-way Hash Function Based on Neural Network Shiguo Lian, Jinsheng Sun, Zhiquan Wang Department of Automation, Nanjing University of Science & echnology, Nanjing, 294, China, sg_lian@63.com Abstract A

More information

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 215 physics pp. 617 627 An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice RENFU

More information

Lecture 22: RSA Encryption. RSA Encryption

Lecture 22: RSA Encryption. RSA Encryption Lecture 22: Recall: RSA Assumption We pick two primes uniformly and independently at random p, q $ P n We define N = p q We shall work over the group (Z N, ), where Z N is the set of all natural numbers

More information

On Wavelet Transform: An extension of Fractional Fourier Transform and its applications in optical signal processing

On Wavelet Transform: An extension of Fractional Fourier Transform and its applications in optical signal processing 22nd International Congress on Modelling and Simulation, Hobart, Tasmania, Australia, 3 to 8 December 2017 mssanz.org.au/modsim2017 On Wavelet Transform: An extension of Fractional Fourier Transform and

More information

Sparse Solutions of Systems of Equations and Sparse Modelling of Signals and Images

Sparse Solutions of Systems of Equations and Sparse Modelling of Signals and Images Sparse Solutions of Systems of Equations and Sparse Modelling of Signals and Images Alfredo Nava-Tudela ant@umd.edu John J. Benedetto Department of Mathematics jjb@umd.edu Abstract In this project we are

More information

A Chaotic Encryption System Using PCA Neural Networks

A Chaotic Encryption System Using PCA Neural Networks A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science

More information

Public Key Encryption

Public Key Encryption Public Key Encryption 3/13/2012 Cryptography 1 Facts About Numbers Prime number p: p is an integer p 2 The only divisors of p are 1 and p s 2, 7, 19 are primes -3, 0, 1, 6 are not primes Prime decomposition

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 11 February 21, 2013 CPSC 467b, Lecture 11 1/27 Discrete Logarithm Diffie-Hellman Key Exchange ElGamal Key Agreement Primitive Roots

More information

Outline. Introduction Definition of fractional fourier transform Linear canonical transform Implementation of FRFT/LCT

Outline. Introduction Definition of fractional fourier transform Linear canonical transform Implementation of FRFT/LCT 04//5 Outline Introduction Definition of fractional fourier transform Linear canonical transform Implementation of FRFT/LCT The Direct Computation DFT-like Method Chirp Convolution Method Discrete fractional

More information

Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis. Financial Cryptography '10, Tenerife, Spain

Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis. Financial Cryptography '10, Tenerife, Spain Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis Bart Mennink (K.U.Leuven) Joint work with: Jorge Guajardo (Philips Research Labs) Berry Schoenmakers (TU Eindhoven)

More information

Module 4. Multi-Resolution Analysis. Version 2 ECE IIT, Kharagpur

Module 4. Multi-Resolution Analysis. Version 2 ECE IIT, Kharagpur Module 4 Multi-Resolution Analysis Lesson Multi-resolution Analysis: Discrete avelet Transforms Instructional Objectives At the end of this lesson, the students should be able to:. Define Discrete avelet

More information

Comparing the Time-Deformation Method with the Fractional Fourier Transform in Filtering Non-Stationary Processes

Comparing the Time-Deformation Method with the Fractional Fourier Transform in Filtering Non-Stationary Processes Journal of Signal and Information Processing, 1, 3, 491-51 http://dx.doi.org/1.436/jsip.1.346 Published Online November 1 (http://www.scirp.org/journal/jsip) Comparing the Time-Deformation Method with

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security Outline Quadratic residues Useful tests Digital Signatures CPSC 467b: Cryptography and Computer Security Lecture 14 Michael J. Fischer Department of Computer Science Yale University March 1, 2010 Michael

More information

PERFORMANCE EVALUATION OF DS-CDMA SYSTEM USING CHAOTIC BINARY SEQUENCES

PERFORMANCE EVALUATION OF DS-CDMA SYSTEM USING CHAOTIC BINARY SEQUENCES PERFORMANCE EVALUATION OF DS-CDMA SYSTEM USING CHAOTIC BINARY SEQUENCES Mahalinga V. Mandi 1, K. N. Hari Bhat 2 and R. Murali 3 1 Associate Professor, Department of Electronics & Communication Engineering,

More information

Research Article Dual-Domain Transform for Travelling Wave in FRFT Domain

Research Article Dual-Domain Transform for Travelling Wave in FRFT Domain International Scholarly Research Network ISRN Applied Mathematics Volume 011, Article ID 161643, 8 pages doi:10.540/011/161643 Research Article Dual-Domain Transform for Travelling Wave in FRFT Domain

More information

arxiv: v2 [cs.cr] 13 Oct 2016

arxiv: v2 [cs.cr] 13 Oct 2016 Nonlinear Dynamics manuscript No. (will be inserted by the editor) Cryptanalyzing image encryption scheme using chaotic logistic map Chengqing Li Tao Xie Qi Liu Ge Cheng arxiv:3.489v2 [cs.cr] 3 Oct 26

More information

A New Quantum Watermarking Based on Quantum Wavelet Transforms

A New Quantum Watermarking Based on Quantum Wavelet Transforms Commun. Theor. Phys. 67 207 732 742 Vol. 67, No. 6, June, 207 A New Quantum Watermarking Based on Quantum Wavelet Transforms Shahrokh Heidari, Mosayeb Naseri, 2, Reza Gheibi, 3 Masoud Baghfalaki, 4 Mohammad

More information

An information encryption system based on Boolean functions

An information encryption system based on Boolean functions Computer Science Journal of Moldova, vol.18, no.3(54), 2010 Information encryption systems based on Boolean functions Aureliu Zgureanu Abstract An information encryption system based on Boolean functions

More information

Simple Matrix Scheme for Encryption (ABC)

Simple Matrix Scheme for Encryption (ABC) Simple Matrix Scheme for Encryption (ABC) Adama Diene, Chengdong Tao, Jintai Ding April 26, 2013 dama Diene, Chengdong Tao, Jintai Ding ()Simple Matrix Scheme for Encryption (ABC) April 26, 2013 1 / 31

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Efficient encryption and decryption. ECE646 Lecture 10. RSA Implementation: Efficient Encryption & Decryption. Required Reading

Efficient encryption and decryption. ECE646 Lecture 10. RSA Implementation: Efficient Encryption & Decryption. Required Reading ECE646 Lecture 10 RSA Implementation: Efficient Encryption & Decryption Required Reading W. Stallings, "Cryptography and etwork-security, Chapter 9.2 The RSA Algorithm Chapter 8.4 The Chinese Remainder

More information

Parameterized Complexity of Partition Sort for Negative Binomial Inputs

Parameterized Complexity of Partition Sort for Negative Binomial Inputs Research Journal of Engineering Sciences ISSN 2278 9472 Parameterized Complexity of Partition Sort for Negative Binomial Inputs Abstract Singh Kumar Niraj 1, Pal Mita 2 and Chakraborty Soubhik 3 1 Department

More information

Research Article A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map

Research Article A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 22, Article ID 9382, 9 pages doi:.55/22/9382 Research Article A Novel True Random Number Generator Based on Mouse Movement and

More information

Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system

Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 1, No., 017, pp.13-19 Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system Keming Tang

More information

Problem with Fourier. Wavelets: a preview. Fourier Gabor Wavelet. Gabor s proposal. in the transform domain. Sinusoid with a small discontinuity

Problem with Fourier. Wavelets: a preview. Fourier Gabor Wavelet. Gabor s proposal. in the transform domain. Sinusoid with a small discontinuity Problem with Fourier Wavelets: a preview February 6, 2003 Acknowledgements: Material compiled from the MATLAB Wavelet Toolbox UG. Fourier analysis -- breaks down a signal into constituent sinusoids of

More information

Wavelets: a preview. February 6, 2003 Acknowledgements: Material compiled from the MATLAB Wavelet Toolbox UG.

Wavelets: a preview. February 6, 2003 Acknowledgements: Material compiled from the MATLAB Wavelet Toolbox UG. Wavelets: a preview February 6, 2003 Acknowledgements: Material compiled from the MATLAB Wavelet Toolbox UG. Problem with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of

More information

Implementation of CCSDS Recommended Standard for Image DC Compression

Implementation of CCSDS Recommended Standard for Image DC Compression Implementation of CCSDS Recommended Standard for Image DC Compression Sonika Gupta Post Graduate Student of Department of Embedded System Engineering G.H. Patel College Of Engineering and Technology Gujarat

More information

MAT335H1F Lec0101 Burbulla

MAT335H1F Lec0101 Burbulla Fall 2011 Q 2 (x) = x 2 2 Q 2 has two repelling fixed points, p = 1 and p + = 2. Moreover, if I = [ p +, p + ] = [ 2, 2], it is easy to check that p I and Q 2 : I I. So for any seed x 0 I, the orbit of

More information

New attacks on RSA with Moduli N = p r q

New attacks on RSA with Moduli N = p r q New attacks on RSA with Moduli N = p r q Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmane.nitaj@unicaen.fr

More information

Can You Hear Me Now?

Can You Hear Me Now? Can You Hear Me Now? An Introduction to Coding Theory William J. Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 19 October 2004 W. J. Turner (Wabash College)

More information

Weak key analysis for chaotic cipher based on randomness properties

Weak key analysis for chaotic cipher based on randomness properties . RESEARCH PAPER. SCIENCE CHINA Information Sciences May 01 Vol. 55 No. 5: 116 1171 doi: 10.1007/s1143-011-4401-x Weak key analysis for chaotic cipher based on randomness properties YIN RuMing, WANG Jian,

More information

Optimizing MPC for robust and scalable integer and floating-point arithmetic

Optimizing MPC for robust and scalable integer and floating-point arithmetic Optimizing MPC for robust and scalable integer and floating-point arithmetic Liisi Kerik * Peeter Laud * Jaak Randmets * * Cybernetica AS University of Tartu, Institute of Computer Science January 30,

More information

Comparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption

Comparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 2 (2015), pp. 55-68 Comparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption Dariusz Puchala Lodz University of Technology Institute

More information

MRI Reconstruction via Fourier Frames on Interleaving Spirals

MRI Reconstruction via Fourier Frames on Interleaving Spirals MRI Reconstruction via Fourier Frames on Interleaving Spirals Christiana Sabett Applied Mathematics & Statistics, and Scientific Computing (AMSC) University of Maryland, College Park Advisors: John Benedetto,

More information

Comparing Numerical Methods for Solving Nonlinear Fractional Order Differential Equations

Comparing Numerical Methods for Solving Nonlinear Fractional Order Differential Equations Comparing Numerical Methods for Solving Nonlinear Fractional Order Differential Equations Farhad Farokhi, Mohammad Haeri, and Mohammad Saleh Tavazoei Abstract This paper is a result of comparison of some

More information

Sparse Solutions of Linear Systems of Equations and Sparse Modeling of Signals and Images: Final Presentation

Sparse Solutions of Linear Systems of Equations and Sparse Modeling of Signals and Images: Final Presentation Sparse Solutions of Linear Systems of Equations and Sparse Modeling of Signals and Images: Final Presentation Alfredo Nava-Tudela John J. Benedetto, advisor 5/10/11 AMSC 663/664 1 Problem Let A be an n

More information

arxiv: v1 [physics.optics] 5 Mar 2012

arxiv: v1 [physics.optics] 5 Mar 2012 Designing and using prior knowledge for phase retrieval Eliyahu Osherovich, Michael Zibulevsky, and Irad Yavneh arxiv:1203.0879v1 [physics.optics] 5 Mar 2012 Computer Science Department, Technion Israel

More information

Lecture note 8: Quantum Algorithms

Lecture note 8: Quantum Algorithms Lecture note 8: Quantum Algorithms Jian-Wei Pan Physikalisches Institut der Universität Heidelberg Philosophenweg 12, 69120 Heidelberg, Germany Outline Quantum Parallelism Shor s quantum factoring algorithm

More information

The failure of McEliece PKC based on Reed-Muller codes.

The failure of McEliece PKC based on Reed-Muller codes. The failure of McEliece PKC based on Reed-Muller codes. May 8, 2013 I. V. Chizhov 1, M. A. Borodin 2 1 Lomonosov Moscow State University. email: ivchizhov@gmail.com, ichizhov@cs.msu.ru 2 Lomonosov Moscow

More information

Parallel fractional correlation: implementation

Parallel fractional correlation: implementation Parallel fractional correlation: implementation an optical Sergio Granieri, Myrian Tebaldi, and Walter D. Furlan An optical setup to obtain all the fractional correlations of a one-dimensional input in

More information

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-secret Image Sharing Long Bao, Student Member, IEEE, Shuang

More information

Diophantine equations via weighted LLL algorithm

Diophantine equations via weighted LLL algorithm Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL algorithm Momonari Kudo Graduate School of Mathematics, Kyushu University, JAPAN Kyushu University Number Theory

More information

ECE 8803 Nonlinear Dynamics and Applications Spring Georgia Tech Lorraine

ECE 8803 Nonlinear Dynamics and Applications Spring Georgia Tech Lorraine ECE 8803 Nonlinear Dynamics and Applications Spring 2018 Georgia Tech Lorraine Brief Description Introduction to the nonlinear dynamics of continuous-time and discrete-time systems. Routes to chaos. Quantification

More information

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL THE MATHEMATICAL BACKGROUND OF CRYPTOGRAPHY Cryptography: used to safeguard information during transmission (e.g., credit card number for internet shopping) as opposed to Coding Theory: used to transmit

More information