Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key
نویسندگان
چکیده
With the aim of tackling insufficient security in chaotic encryption algorithm for digital images Optical Access Network, a color image scheme combining non-degenerate discrete hyperchaotic system and deoxyribonucleic acid (DNA) dynamic encoding is proposed. First, new constructed with all positive Lyapunov more complex characteristics. Furthermore, key sequence based on generated using plaintext correlation to achieve effect secret key. Next, binary bit-planes permutation performed one sequences. Then, used sequentially perform DNA encoding, obfuscation, decoding. Finally, obfuscation obtain final ciphertext. The research results show that can pass NIST 800-22 test, corresponding resist various common attacks has strong anti-interference ability. In addition, verified ARM-Embedded, which proves proposed this paper feasible secure communication technology scheme. Therefore, helpful provide ideas design application high-security cryptosystem optical access network.
منابع مشابه
Lattice Codes for Secure Communication and Secret Key Generation
In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honestbut-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is...
متن کاملKey-Based Scrambling for Secure Image Communication
Secure image communication is becoming increasingly important due to theft and manipulation of its content. Law enforcement agents may find it increasingly difficult to stay afloat above the ill intentions of hackers. We have been able to develop an image scrambling algorithm that is very simple to implement but almost impossible to breach with a probability less than 5x10− 300. This is possibl...
متن کاملA Key Based Secure Threshold Cryptography for Secret Image
This paper presents a key based secured (k, n) threshold cryptography where key is used to encrypt the secret and then the secret as well as key is shared among set of n participants. In sharing phase, each secret byte is selected randomly from secret fields depending upon the key. That provides additional protection of the secret data. Also, each share has some bytes missing and these missing ...
متن کاملIntermittent Impulsive Synchronization of Hyperchaos with Application to Secure Communication
In this paper, a hyperchaotic system is presented as the chaotic carrier to encrypt information in secure communication. The sensitivity to the system parameters and delay of the hyperchaotic system, i.e., its chaotic degree indicated by the number of positive Lyapunov exponents, increases with its system parameter and delay, guaranteeing a large enough key space when one selects its system par...
متن کاملModelling secure secret key exchange using stochastic process algebra
In this paper we explore the trade-of between security and performance in considering a model of a key distribution centre. The model is specified using the Markovian process algebra PEPA and analysed numerically. Three versions of the model are proposed, using different modelling approaches and assumptions about the behaviour of the system. These different models are shown to display the same ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2022
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math10173180