Images Cryptosystem based on Chaotic Maps for Databases Security

被引:0
作者
Mousa, Ayman [1 ]
El-Rabaie, El-Sayed M. [2 ]
Nigm, E. M. [3 ]
Faragallah, Osama S. [2 ]
机构
[1] Workers Univ, Dept Comp Sci, Tanta 12311, Egypt
[2] Menoufia Univ, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[3] Zagazig Univ, Dept Math, Zagazig 44519, Egypt
来源
PROCEEDINGS OF THE 2013 SECOND INTERNATIONAL JAPAN-EGYPT CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND COMPUTERS (JEC-ECC) | 2013年
关键词
database security; cryptography; chaos; standard map; henon Map; confusion-diffusion;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Chaos in cryptography is of huge interest in many areas such as databases, e-business, and security of communication channels, in order to preserve sensible data from attacks of unauthorized persons. The chaotic maps are becoming increasingly popular in real-time image encryption/ decryption systems for its high security, speed, computational overheads. In this paper we apply two processes: chaotic confusion and diffusion of the pixel values, which provide images cry ptosystem of the databases based on chaotic maps. It is implemented by development our database encryption simulation in a previous work done by the authors. This developing conforms by adding chaotic standard and henon map in our simulation. Examining its implementation for image encryption based on chaotic maps along with its detailed performance evaluation and security analysis. Experimental results demonstrate that the image cryptosystem has satisfactory efficient and very secure, which makes it a possible candidate for images encryption in the databases.
引用
收藏
页码:154 / 158
页数:5
相关论文
共 17 条
  • [1] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [2] A symmetric image encryption scheme based on 3D chaotic cat maps
    Chen, GR
    Mao, YB
    Chui, CK
    [J]. CHAOS SOLITONS & FRACTALS, 2004, 21 (03) : 749 - 761
  • [3] Elhoseny Heba M., 2013, CHAOTIC ENCRYPTION I
  • [4] Fei Peng, 2005, P 2005 INT C COMM CI, V2, P1139
  • [5] Image encryption based on chaotic modulation of wavelet coefficients
    He, Xiping
    Zhang, Qionghua
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2008, : 622 - +
  • [6] 2-DIMENSIONAL MAPPING WITH A STRANGE ATTRACTOR
    HENON, M
    [J]. COMMUNICATIONS IN MATHEMATICAL PHYSICS, 1976, 50 (01) : 69 - 77
  • [7] Huang Yuanshi, 2006, P INT C COMP GRAPH I
  • [8] Chaos and cryptography: Block encryption ciphers based on chaotic maps
    Jakimoski, G
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (02) : 163 - 169
  • [9] KATZ J., 2008, Introduction to Modern Cryptography
  • [10] Security analysis of a chaos-based image encryption algorithm
    Lian, SG
    Sun, JS
    Wang, ZQ
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 351 (2-4) : 645 - 661