Chaos-based encryption of multimedia data and design of security analysis interface as an educational tool

被引:14
|
作者
Akgul, Akif [1 ]
Kacar, Sezgin [1 ]
Pehlivan, Ihsan [1 ]
Aricioglu, Burak [1 ]
机构
[1] Sakarya Univ Appl Sci, Fac Technol, Dept Elect & Elect Engn, Esentepe Campus, TR-54187 Sakarya, Turkey
关键词
chaos based encryption; multimedia data security; security analysis; MATLAB BUILDER NE; IMAGE ENCRYPTION; ALGORITHM; SYSTEM; CIRCUIT;
D O I
10.1002/cae.22038
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Data encryption has always been a topical subject. There are many encryption methods in the literature. Chaos-based encryption is considered a different area of study among the encryption practices. In this study, a novel interface was designed for chaos-based encryption to be used as an educational tool in cryptology. With this interface, the chaos-based encryption of multimedia data (picture, audio, text) can be done with one, two, or three dimensional discrete-time chaotic maps. Also, the reliability of every encryption method must be checked via certain security analyses. Thus, five different security analyses (information entropy, correlation, speed effect, differential attack, and histogram analysis), where applicable, were added into the interface to perform security analyses of chaos-based encrypted data. In this way, the chaotic encryption and security analyses, both of which need high level programming knowledge, have become available in a compact way, for those who are interested in this subject but are not knowledgeable enough about programming, hence the interface can be used as an educational tool in chaos or encryption studies.
引用
收藏
页码:1336 / 1349
页数:14
相关论文
共 50 条
  • [1] Security Analysis of a Chaos-Based Image Encryption Scheme
    Ergun, Salih
    2018 19TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (IEEE MELECON'18), 2018, : 58 - 61
  • [2] Security analysis of a chaos-based image encryption algorithm
    Lian, SG
    Sun, JS
    Wang, ZQ
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 351 (2-4) : 645 - 661
  • [3] An analysis of chaos-based security solution for fingerprint data
    Su, Moting
    Wen, Wenying
    OPTIK, 2014, 125 (21): : 6530 - 6534
  • [4] Spatial chaos-based image encryption design
    LIU ShuTang & SUN FuYan College of Control Science and Engineering
    Science China(Physics,Mechanics & Astronomy), 2009, (02) : 177 - 183
  • [5] Improvement of Security and Feasibility for Chaos-Based Multimedia Cryptosystem
    Chen, Jianyong
    Zhou, Junwei
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT IV, 2011, 6785 : 604 - 618
  • [6] Spatial chaos-based image encryption design
    ShuTang Liu
    FuYan Sun
    Science in China Series G: Physics, Mechanics and Astronomy, 2009, 52 : 177 - 183
  • [7] Spatial chaos-based image encryption design
    Liu ShuTang
    Sun FuYan
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2009, 52 (02): : 177 - 183
  • [8] Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption
    Preishuber, Mario
    Huetter, Thomas
    Katzenbeisser, Stefan
    Uhl, Andreas
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2137 - 2150
  • [9] Scheme for Chaos-based Encryption and Lyapunov Analysis
    Gularte, Kevin H. M.
    Rego, Leonardo N. C.
    Vargas, Jose A. R.
    2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION/XXIII CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (ICA-ACCA), 2018,
  • [10] A CHAOS-BASED MULTIPLE SECURITY ENCRYPTION SYSTEM FOR COMPRESSED VIDEO
    Hong, Shun-Cheng
    Kuo, Chi-Huang
    Chen, Hsi-Kuan
    Chen, Chin-Hsing
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (08): : 4635 - 4652