Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography: Theory and Practice
Cryptography: Theory and Practice
The Design of Rijndael
Cryptanalysis and improvement on a cryptosystem based on a chaotic map
Computers & Mathematics with Applications
Recent developments in cryptographic hash functions: Security implications and future directions
Information Security Tech. Report
MD5 collisions and the impact on computer forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A novel colour image encryption algorithm based on chaos
Signal Processing
A robust hybrid method for image encryption based on Hopfield neural network
Computers and Electrical Engineering
Image encryption using DNA complementary rule and chaotic maps
Applied Soft Computing
A novel image encryption/decryption scheme based on chaotic neural networks
Engineering Applications of Artificial Intelligence
Novel Approach for fast Compressed Hybrid color image Cryptosystem
Advances in Engineering Software
Information Sciences: an International Journal
A RGB image encryption algorithm based on DNA encoding and chaos map
Computers and Electrical Engineering
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
International Journal of Communication Networks and Distributed Systems
Chaos-based color pathological image encryption scheme using one-time keys
Computers in Biology and Medicine
Hi-index | 0.09 |
We designed a stream-cipher algorithm based on one-time keys and robust chaotic maps, in order to get high security and improve the dynamical degradation. We utilized the piecewise linear chaotic map as the generator of a pseudo-random key stream sequence. The initial conditions were generated by the true random number generators, the MD5 of the mouse positions. We applied the algorithm to encrypt the color image, and got the satisfactory level security by two measures: NPCR and UACI. When the collision of MD5 had been found, we combined the algorithm with the traditional cycle encryption to ensure higher security. The ciphered image is robust against noise, and makes known attack unfeasible. It is suitable for application in color image encryption.