research centers


Search results: Found 26

Listing 11 - 20 of 26 << page
of 3
>>
Sort by

Article
Images Encryption Using Chaos and Random Generation
تشفير الصور بأستخدام نظرية الفوضى و التوليد العشوائي

Authors: Yossra Hussain Ail --- Zahraa A.H. Alobaidy
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2016 Volume: 34 Issue: 1 Part (B) Scientific Pages: 172-179
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Due to the network and multimedia application development information security become important since information can be attacked over the transmission channels and the combination of cryptography and chaotic become important filed of information security, where many encryption algorithm are based on chaotic mapping due to the inherent features of image like high redundancy and bulk data capacity. In this paper, three chaotic maps are used to achieve good diffused image by setting the initial conditions to generate the shuffling sequence randomly by 2D zaslevskii mapand employ them in 2D cat map for shuffling the image pixels positions, also baker map is used to decomposed image into four rectangles and shuffle them.To increase the security level of the encryption algorithm Geffe random key generator is used to generate 128 bit key and employ it with exclusive-OR equation to the diffused image. The results indicated that the combination of chaotic and cryptography proved to be good for high security level. All the experimental results show that the proposed algorithm is secure due to the large key space and the high sensitivity to the secret key.

نظرآ للتطور الحاصل في الشبكات وتطبيقات الوسائط المتعددة والهجوم الذي تتعرض له البيانات عبره قنوات النقل أصبحت أمنية المعلومات مهمة. الجمع بين علم التشفير ونظرية الفوضى مجال مهم في امنية المعلومات. ان الكثير من خوازميات تشفير الصور تعتمد على خرائط الفوضى بسبب الميزات الكامنة في الصور كالتكرار وسعة البيانات الكبيرة. في هذا البحث تم استخدام ثلاث خرائط فوضى للحصول على صوره مشفره بشكل جيد وتم ذلك من خلال وضع القيم الاولية لتوليد سلسلة من القيم العشوائية باستخدام خريطة Zaslevskii وتوظيف هذه القيم العشوائيه في خريطة Cat لبعثرت مواقع البكسل في الصوره, كذلك استخدمة خريطة Baker لتقطيع الصوره الي اربع مستطيلات و بعثرت كل منها. لزيادة مستوى الامنيه في هذه الخوارزمية تم استخدام المولد Geffeلتوليد مفتاح عشوائيا بطول 128بت وتوظيفه في معادلة exclusive-OR مع الصوره المبعثره. ان الجمع بين علم التشفير ونظرية الفوضي اعطى مستوى عالي من الامنيه وقد اظهرتالنتائج ان الخوارزمية المقترحة أمنة نظرا لحجم المفتاح ودرجة الحساسيه العاليه للوصول الى المفتاح.


Article
A novel chaotic System For Color Image Encryption
نظام فوضوي مبتكر لتشفير صورة ملونة

Authors: Salim Ali ABBAS سالم علي عباس --- Abid Ali H. Alta عبد علي حمودي --- Sadiq A. Mehdi صادق عبد العزيز مهدي
Journal: Journal of College of Education مجلة كلية التربية ISSN: 18120380 Year: 2017 Issue: 1 Pages: 147-162
Publisher: Al-Mustansyriah University الجامعة المستنصرية

Loading...
Loading...
Abstract

a new color image encryption algorithm is proposed by combining diffusion the image pixel and keys that generating by a novel chaotic system. The performance of the algorithm has been analyzed through analyzes statistical such as histogram analysis, correlation coefficient analysis, Information entropy analysis, key space analysis, key sensitivity analysis, and results show that the algorithm has good encryption performance and high security due to key space size can reach to 10308 which means that very long , and the high sensitivity for small changes in key which makes the algorithm immune to Brute force attacks, and it can resist the statistical attacks, so the key space was large enough to resist many statistical attack methods, the algorithm has been implemented and analysis done by using Matlab R2012b software.

تم اقتراح خوارزمية جديدة لتشفير صورة ملونة من خلال الجمع بين انتشار قيم مواقع الصورة والمفاتيح التي تولدت من النظام الفوضوي المبتكر. وقد تم تحليل أداء الخوارزمية من خلال اجراء التحليلات الإحصائية مثل : تحليل المدرج التكراري ، وتحليل معامل الارتباط، وتحليل انتروبية المعلومات ، تحليل مساحة المفتاح، تحليل حساسية المفتاح، وأظهرت النتائج أن الخوارزمية لديها اداء جيد للتشفير وذات امنية عالية نظرا ً لحجم مساحة المفتاح الذي يمكن ان يصل الى 10308 وهوما يعني كبير جدا ً، وان الخوارزمية ذات حساسية عالية لإجراء تغييرات صغيرة في المفتاح الذي يجعل الخوارزمية في مأمن من هجمات القوة الوحشية ، وبالتالي فإن حجم مساحة المفتاح كبير بما فيه الكفاية لمقاومة العديد من أساليب الهجوم الإحصائية. تم استخدام برنامج الـMatlabR2010a لتنفيذ الخوارزمية واجراء التحليلات.


Article
Lagrange Interpolation - OcTree for 2D-3D Chaotic Image Encryption
استيفاء لاكرانج والشجرة الثمانية لتشفير الفوضوي للصورة ثنائية وثلاثية الابعاد

Authors: Haider K. Hoomod حيدر كاظم حمود --- Shymaa M. Jameel شيماء محمد جميل --- Huda A. Abul Jabbar* هدى عبد اللطيف عبدالجبار
Journal: Journal of College of Education مجلة كلية التربية ISSN: 18120380 Year: 2015 Issue: 1 Pages: 281-298
Publisher: Al-Mustansyriah University الجامعة المستنصرية

Loading...
Loading...
Abstract

A new proposed development used to encrypt the private 2D-3D image with proper encryption speed. The proposed developments were use to increase the security powerful and randomness of the output results depending on multi stage encryptions. In this paper, the developed Lagrange interpolation polynomial was use for encryption key generation first stage of encryption. 3D Rossler chaotic key generation is also used to generate key for the second encryption stage. Three steps for encoding and encryption achieved to accomplish the encryption process of private image. AES algorithm, OcTree and Xor techniques were used in build the proposed technique. A good encryption speed with less in operation time with minimum correlation were get from implement the system..

اقتراح تطوير جديد على نظام لتشفير الصور الخاصة ذات البعدين والثلاثة ابعاد لضمان تشفير المعلومات بسرعة مناسبة .ان الاقتراحات المقدمة تهدف الى زيادة قوة التشفير والعشوائية للنتائج من خلال استخدام التشفير المتعدد. في هذه البحث اقترح تطوير استخدام لاغرانج الاستيفاء لحساب متعدد الحدود في إنشاء المفتاح للمرحلة الاولى من التشفير.واقترح استخدام ولد روسلر ثلاثي الابعاد لتوليد مفتاح التشفير للمرحلة الثانية من التشفير. واستخدمت ثلاث خطوات من التشفير والترميز لإكمال التشفير الخاص بالصورة.AES algorithm، OcTtree و Xor تقنيات استخدمت في بناء التقنية المقترحة. بسرعة جيدة للتشفير ووقت جيد لعملية وباقل معامل ارتباط تم الحصول عليه من تنفيذ هذه التقنية المقترحة.'


Article
Image Encryption Using DNA Encoding and RC4 Algorithm

Authors: Sarab M. Hameed --- Hiba A. Sa’adoon --- Mayyadah Al-Ani
Journal: Iraqi Journal of Science المجلة العراقية للعلوم ISSN: 00672904/23121637 Year: 2018 Volume: 58 Issue: 1B Pages: 434-446
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

Nowadays, the rapid development of multi-media technology and digital images transmission by the Internet leads the digital images to be exposed to several attacks in the transmission process. Therefore, protection of digital images become increasingly important. To this end, an image encryption method that adopts Rivest Cipher (RC4) and Deoxyribonucleic Acid (DNA) encoding to increase the secrecy and randomness of the image without affecting its quality is proposed. The Means Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Coefficient Correlation (CC) and histogram analysis are used as an evaluation metrics to evaluate the performance of the proposed method. The results indicate that the proposed method is secure against statistical attacks and provides a good security without affecting the quality of the image.


Article
A new Color image Encryption based on multi Chaotic Maps

Authors: Ibtisam A.Taqi --- Sarab M. Hameed
Journal: Iraqi Journal of Science المجلة العراقية للعلوم ISSN: 00672904/23121637 Year: 2018 Volume: 59 Issue: 4B Pages: 2117-2127
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.


Article
Key Generator to Encryption Images Based on Chaotic Maps

Authors: Ali H. Kashmar --- Ahmed Yousif
Journal: Iraqi Journal of Science المجلة العراقية للعلوم ISSN: 00672904/23121637 Year: 2019 Volume: 60 Issue: 2 Pages: 362-370
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps. The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of the standard balance and time execution. The results show that any change in input will change the output and the time required for the application requires only parts of the minute. The output is passed through the exponential function [exp (X))] to obtain a wide range of input. The result is then set to machine words to fit the desired range of multicast used. The next step is the output of machine words that will be used as input to the array that we have structured to generate the key. The key is converted to a sequential element into an element with an ordinary image to produce the encrypted image. Furthermore, keystream succeeded by passing tests (NIST statistical package tests for random). Finally, the real-time image encoding of the corresponding algorithm was applied; preliminary results show that the proposed algorithm has good coding strength with added benefit that resists security analysis.


Article
Color Image Compression and Encryption Based on Compressive Sensing
ضغط وتشفير الصورةالملونة باستخدام الضاغط الحساس

Author: Haraa Raheem Hatem
Journal: Journal of Engineering and Sustainable Development مجلة الهندسة والتنمية المستدامة ISSN: 25200917 Year: 2018 Volume: 22 Issue: 1 Pages: 149-161
Publisher: Al-Mustansyriah University الجامعة المستنصرية

Loading...
Loading...
Abstract

In this paper; a simple and powerful technique is proposed to encrypt and compress the color image in one step based on Compressive Sensing (CS) with using multi-chaotic system (Chen and Chua) as measurement matrix. The CS is used due to many properties; Greatly reduce the ratio of signal sampling, the size of capacity, power unitization, computational complexity that need to represent a sparse signal or images and lead signal processing into a new revolutionary era. In addition to all the above features; it combines encryption and compression in the one step. Also using chaotic system (Chen and Chua) as measurement matrix in CS provides high level of security to the encryption and compression image since each one of chaotic system has Three-dimension variable. The simulation results demonstrate the compression and encryption color image has low storage size and transmitted requirement, high security, large key size and low encryption time requirement since image compression and encryption in the same step, incoherence, key sensitivity, and resistance to brute force attack. Also the recovered image, has good quality (to human perception) and saves both the clarity and the characteristics of the image.


Article
Image Encryption using Resilient Boolean Function and DCT

Authors: Hussam A. Darweesh --- Ekbal H. Ali --- Azhar Malik
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2011 Volume: 29 Issue: 12 Pages: 2551-2563
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

The information security is becoming more important in data storage and transmission, where images are widely used in it. The Stream cipher cryptosystems are extensively used for provide a reliable and efficient method of security. The new propose system image encryption investigated by encrypt the powerful frequency coefficients in DCT by used saturated best resilient Boolean function that constructed by Zhang's constructions that implement Maiorana-McFarland like constructions technique and its modifications. The simulation results of the proposal system calculate correlation test (Corr1) and PSNR1 to compare between original and encrypted image as parameter of robustness, and correlation test (Corr2) and PSNR2 as correlation parameter between original and decrypted image as parameter of quality in reconstruct image.


Article
A Technique for Image Steganography Based on Optimal Resilient Boolean Functions and DCT

Author: Azhar Malik
Journal: IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING المجلة العراقية لهندسة الحاسبات والاتصالات والسيطرة والنظم ISSN: 18119212 Year: 2013 Volume: 13 Issue: 2 Pages: 71-80
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Abstract:One of the methods introduced for accomplishing hidden communicationis the steganography technique. Steganography is an important area of research in recentyears involving a number of applications. It is the science of embedding informationinto the cover image, text and video without causing statistically significantmodification to the cover image. This paper proposes an image steganography system; ithides the gray level image on another gray level image by using optimal resilientBoolean functions. First, it starts by encrypting secret image by using optimal resilientfunction then embedding encrypted image inside a cover image by using DCT. The newproposal system of image encryption has been investigated by encrypting the powerfulfrequency coefficients in DCT using a saturated best resilient Boolean function (SRB)that constructed by Zhang's construction. The simulation results of the proposal systemhave calculated the peak signal to noise ratio (PSNR) and the correlation test in order tocompare between the cover image and the stego image and the results have alsocalculated the correlation test between the secrete image and the extraction image as aparameter of robustness. The experimental results have showed that the images can beembedded by steganography and optimal resilient Boolean function with smallercorrelation compared to the original secret image and the extraction image. Finally, it isobserved that for all images, PSNR is greater than 55.


Article
Digital Image Encryption by Random Pixel Selecting Using Chaotic Sequences
تشفير الصورة الرقمية باختيار عنصر الصورة عشوائيا باستخدام المتواليات الفوضوية

Authors: Hikmat N. Abdullah حمكت نجم عبد الله --- Hadi. T. Zeboon هادي طارش زبون --- Atheer J. Mansor اثير جبار منصور
Journal: Journal of Al-Ma'moon College مجلة كلية المأمون ISSN: 19924453 Year: 2015 Issue: 26 Pages: 228-236
Publisher: AlMamon University College كلية المامون الجامعة

Loading...
Loading...
Abstract

Encryption using chaotic schemes provides a greater level of security than conventional ciphers. In this paper, we present an encryption system uses chaotic sequences for digital image encryption depends on two chaotic systems. The first chaotic system that is used to select the pixel position to be encrypted, while the second system is used to generate a key to change the value of the selected pixel using XOR logic operation .The paper proposes an approach to change the pixels values different from the traditional approach in the sense that instead of changing the values of the pixels serially starting from the first pixel ,it selects the pixels randomly and change their values with random number, which gives more immunity and security. The results show that the proposed system works successfully when tested.Ialso shows that it has very high sensitivity to parameters change where a change of 0.0001% in one out of 12 parameters does not allow successful decryption.

إن التشفير باستخدام المتواليات الفوضوية يوفر مستوى سرية اعلى من المشفرات التقليدية. وفي هذا البحث ، نقدم نظام تشفير بأستخدام المتتابعات الفوضوية للصورة الرقمية بالاعتماد على نظامين فوضويين. يستخدم النظام الفوضوي الاول لاختيار موقع عنصر الصورة المراد تشفيره ، بينما النظام الثاني يستخدم لتوليد المفتاح لتغيير قيمة عنصر الصورة المختار باستخدام عملية بوابة XOR. يقدم البحث مقترحا لتغيير قيمة عنصر الصورة مختلف عن الاسلوب العادي وذلك انه بدلا من تغيير قيم عناصر الصورة بشكل متسلسل بداية من العنصر الاول, فان المقترح ان يتم اختيار العنصر عشوائيا وتغيير قيمته عشوائيا , بحيث يعطي أكثر مناعة و سرية. واوضحت النتائج المعروضة ان النظام المقترح عمل بنجاح عندما تم اختباره . كذلك بين الحساسية العالية جدا تجاه تغيير القيم الأولية حيث ان أي تغيير بنسبة 0.0001% لأحد القيم الاولية الاثنا عشر لا يسمح بعملية فك تشفير ناجحة.

Listing 11 - 20 of 26 << page
of 3
>>
Sort by
Narrow your search

Resource type

article (26)


Language

English (24)

Arabic (1)

Arabic and English (1)


Year
From To Submit

2019 (2)

2018 (6)

2017 (3)

2016 (2)

2015 (6)

More...