Images Cryptosystem based on Chaotic Maps for Databases Security

被引:0
|
作者
Mousa, Ayman [1 ]
El-Rabaie, El-Sayed M. [2 ]
Nigm, E. M. [3 ]
Faragallah, Osama S. [2 ]
机构
[1] Workers Univ, Dept Comp Sci, Tanta 12311, Egypt
[2] Menoufia Univ, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[3] Zagazig Univ, Dept Math, Zagazig 44519, Egypt
关键词
database security; cryptography; chaos; standard map; henon Map; confusion-diffusion;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Chaos in cryptography is of huge interest in many areas such as databases, e-business, and security of communication channels, in order to preserve sensible data from attacks of unauthorized persons. The chaotic maps are becoming increasingly popular in real-time image encryption/ decryption systems for its high security, speed, computational overheads. In this paper we apply two processes: chaotic confusion and diffusion of the pixel values, which provide images cry ptosystem of the databases based on chaotic maps. It is implemented by development our database encryption simulation in a previous work done by the authors. This developing conforms by adding chaotic standard and henon map in our simulation. Examining its implementation for image encryption based on chaotic maps along with its detailed performance evaluation and security analysis. Experimental results demonstrate that the image cryptosystem has satisfactory efficient and very secure, which makes it a possible candidate for images encryption in the databases.
引用
收藏
页码:154 / 158
页数:5
相关论文
共 50 条
  • [21] Security of a key agreement protocol based on chaotic maps
    Han, Song
    CHAOS SOLITONS & FRACTALS, 2008, 38 (03) : 764 - 768
  • [22] Authenticated RFID security mechanism based on chaotic maps
    Cheng, Zi-Yao
    Liu, Yun
    Chang, Chin-Chen
    Chang, Shih-Chang
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 247 - 256
  • [23] Vulnerabilities of RFID Security Protocol Based on Chaotic Maps
    Akgun, Mete
    Caglayan, M. Ufuk
    2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2014, : 648 - 653
  • [24] Improving the security of a dynamic look-up table based chaotic cryptosystem
    Xiao, Di
    Liao, Xiaofeng
    Wong, Kwok-Wo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2006, 53 (06) : 502 - 506
  • [25] Correction to: Image cryptosystem based on plain image correlation rate and selective chaotic maps
    Ahmad Pourjabbar Kari
    Ahmad Habibizad Navin
    Amir Massoud Bidgoli
    Mirkamal Mirnia
    Multimedia Tools and Applications, 2022, 81 : 38235 - 38235
  • [26] Hash key-based image cryptosystem using chaotic maps and cellular automata
    Ben Slimane, Nabil
    Aouf, Nahed
    Bouallegue, Kais
    Machhout, Mohsen
    2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, : 190 - 194
  • [27] Development of a New Chaotic Maps Cryptosystem with Quadratic Residue Problem
    Tahat, Nedal
    Shaqbou'a, Rania
    Abu-Dalu, Maysam
    Qadomi, Ala
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (11) : 31 - 41
  • [28] A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding
    Sheela S.J.
    Suresh K.V.
    Tandur D.
    Sheela, S.J. (sheeladinu@sit.ac.in), 1600, Hindawi Limited (2017):
  • [29] Cancelable biometric security system based on advanced chaotic maps
    Abd El-Hameed, Hayam A.
    Ramadan, Noha
    El-Shafai, Walid
    Khalaf, Ashraf A. M.
    Ahmed, Hossam Eldin H.
    Elkhamy, Said E.
    Abd El-Samie, Fathi E.
    VISUAL COMPUTER, 2022, 38 (06): : 2171 - 2187
  • [30] On the security of a novel key agreement protocol based on chaotic maps
    Xiang, Tao
    Wong, Kwok-Wo
    Liao, Xiaofeng
    CHAOS SOLITONS & FRACTALS, 2009, 40 (02) : 672 - 675