A new cryptographic algorithm via a two-dimensional chaotic map

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Image Encryption Algorithm Based on Two- dimensional Coupled Chaotic Map

In this paper, a kind of two-dimensional coupled chaotic transcendental map (TCCTM) was proposed. Firstly, by using the TCCTM chaotic sequences were generated,then the chaotic sequences were modified to generate chaotic key stream that is more suitable for image encryption. In the process of encryption, an original color image was decomposed into three images of red, green and blue components, ...

متن کامل

Data Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach

Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed many applications in clustering data. One of these applications is the clustering of images. The problem with the earlier methods used in clustering images was in selecting in...

متن کامل

Data Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach

Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed many applications in clustering data. One of these applications is the clustering of images. The problem with the earlier methods used in clustering images was in selecting in...

متن کامل

Cryptanalysis of a Cryptographic Algorithm that Utilizes Chaotic Neural Networks

This paper deals with the security and efficiency issues of a cryptographic algorithm which utilizes the principles of Chaotic Neural Network (CNN). The algorithm that we consider is the Delayed CNNBased Encryption (DCBE), which is an encryption algorithm based on the Delayed CNN. Although the cryptographic algorithm has its own salient characteristics, our analysis show that, unfortunately, th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ain Shams Engineering Journal

سال: 2021

ISSN: 2090-4479

DOI: 10.1016/j.asej.2021.05.004