Images Cryptosystem based on Chaotic Maps for Databases Security

被引:0
|
作者
Mousa, Ayman [1 ]
El-Rabaie, El-Sayed M. [2 ]
Nigm, E. M. [3 ]
Faragallah, Osama S. [2 ]
机构
[1] Workers Univ, Dept Comp Sci, Tanta 12311, Egypt
[2] Menoufia Univ, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[3] Zagazig Univ, Dept Math, Zagazig 44519, Egypt
关键词
database security; cryptography; chaos; standard map; henon Map; confusion-diffusion;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Chaos in cryptography is of huge interest in many areas such as databases, e-business, and security of communication channels, in order to preserve sensible data from attacks of unauthorized persons. The chaotic maps are becoming increasingly popular in real-time image encryption/ decryption systems for its high security, speed, computational overheads. In this paper we apply two processes: chaotic confusion and diffusion of the pixel values, which provide images cry ptosystem of the databases based on chaotic maps. It is implemented by development our database encryption simulation in a previous work done by the authors. This developing conforms by adding chaotic standard and henon map in our simulation. Examining its implementation for image encryption based on chaotic maps along with its detailed performance evaluation and security analysis. Experimental results demonstrate that the image cryptosystem has satisfactory efficient and very secure, which makes it a possible candidate for images encryption in the databases.
引用
收藏
页码:154 / 158
页数:5
相关论文
共 50 条
  • [41] Improving the security of a parallel keyed hash function based on chaotic maps
    Xiao, Di
    Liao, Xiaofeng
    Wang, Yong
    PHYSICS LETTERS A, 2009, 373 (47) : 4346 - 4353
  • [42] A security-enhanced key agreement protocol based on chaotic maps
    Chen, Tzung-Her
    Wang, Bing-Jian
    Tu, Tai-Yuan
    Wang, Chih-Hung
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 108 - 114
  • [43] On the Security of a Mutual Authentication and Key Agreement Protocol based on Chaotic Maps
    Chen, Chien-Ming
    Xu, Linlin
    Zhang, Xiaojie
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, : 143 - 146
  • [44] Security improvement on an anonymous key agreement protocol based on chaotic maps
    Xue, Kaiping
    Hong, Peilin
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (07) : 2969 - 2977
  • [45] Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps
    Mfungo, Dani Elias
    Fu, Xianping
    ENTROPY, 2023, 25 (11)
  • [46] An Encryption Scheme for Color Images Based on Chaotic Maps and Genetic Operators
    El-Alfy, El-Sayed M.
    Al-Utaibi, Khaled A.
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 92 - 97
  • [47] Comment on "On the security of a spatiotemporal chaotic cryptosystem" [Chaos 17, 033117 (2007)]
    Wang, Shihong
    Hu, Gang
    CHAOS, 2008, 18 (03)
  • [48] Improvement of cryptosystem based on iterating chaotic map
    Ben Farah, M. A.
    Kachouri, A.
    Samet, M.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (06) : 2543 - 2553
  • [49] CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
    Arroyo, David
    Alvarez, Gonzalo
    Li, Shujun
    Li, Chengqing
    Fernandez, Veronica
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2009, 23 (05): : 651 - 659
  • [50] A new cryptosystem based on spatial chaotic system
    Sun, Fuyan
    Lue, Zongwang
    Liu, Shutang
    OPTICS COMMUNICATIONS, 2010, 283 (10) : 2066 - 2073