Encryption Process

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 4977 Experts worldwide ranked by ideXlab platform

I N Stouboulos - One of the best experts on this subject based on the ideXlab platform.

  • image Encryption Process based on chaotic synchronization phenomena
    Signal Processing, 2013
    Co-Authors: Ch K Volos, I M Kyprianidis, I N Stouboulos
    Abstract:

    This paper presents a novel image Encryption scheme, which uses a chaotic True Random Bits Generator (TRBG). The chaotic TRBG is based on the coexistence of two different synchronization phenomena. The first one is the well-known complete chaotic synchronization while the second one is a recently new proposed synchronization phenomenon, the inverse π-lag synchronization. This coexistence is observed in the case of two mutually coupled identical nonlinear circuits. The nonlinear circuit, which is used, produces double-scroll chaotic attractors. The initial conditions of the coupled system and the values of the circuit's parameters serve as the private key of the proposed cryptographic scheme. In order to face the challenge of using this chaotic TRBG in such cryptographic schemes, the produced bits sequence is subjected to statistical tests which are the well-known Federal Information Processing Standards-140-2. This bits sequence has then been used to encrypt and decrypt gray-scale images. Also, the security analysis of the encrypted image demonstrates the high security of the proposed Encryption scheme. Highlights? We develop an image Encryption scheme based on a chaotic random bits generator. ? The coexistence of synchronization phenomena is the main feature of this generator. ? The complete and the inverse π-lag are the observed synchronization phenomena. ? The nonlinear circuit, which is used, produces double-scroll chaotic attractors. ? The high security of the proposed Encryption scheme is confirmed.

  • fingerprint images Encryption Process based on a chaotic true random bits generator
    International Journal of Multimedia Intelligence and Security, 2010
    Co-Authors: Ch K Volos, I M Kyprianidis, I N Stouboulos
    Abstract:

    In recent years, information security requires randomly selected strong keys. Most of the proposed methods provide keys, which are based on chaotic cryptographic algorithms. In this paper, a fingerprint image Encryption scheme, based on a chaotic true random bit generator (TRBG), is proposed. The chaotic generator is based on a non-linear electronic circuit, which produces double scroll chaotic attractors. The initial conditions and the values of the circuit parameters serve as the private key of the cryptographic scheme. We use two chaotic generators with different initial conditions, which produce the bits sequences that XOR-ed for generating the final bits sequence. A well known statistical suite for testing the distribution of the bits sequence was adopted. This sequence has been used to encrypt and decrypt the fingerprint images. Also, the security analysis of the encrypted image demonstrates the high security of the proposed Encryption scheme.

  • image Encryption Process based on a chaotic true random bit generator
    International Conference on Digital Signal Processing, 2009
    Co-Authors: Ch K Volos, I M Kyprianidis, I N Stouboulos
    Abstract:

    In recent years, information security requires randomly selected strong keys. Most of the proposed methods provide keys based on chaotic cryptographic algorithms. In this paper, an image Encryption scheme based on a chaotic True Random Bit Generator (TRBG) is proposed. The chaotic generator is a nonlinear electronic circuit which produces double scroll chaotic attractors. The values of the circuit parameters and the initial conditions are the keys of the cryptographic scheme. Since the dynamic behavior of the circuit is so unpredictable, a true random bits sequence is produced via a well known method. We adopt the FIPS 140-1 statistical suite to test the distribution of the bits sequence. This sequence is used to encrypt and decrypt images. Also, the security analysis of the encrypted image demonstrates the high security of the proposed scheme.

Christian Roux - One of the best experts on this subject based on the ideXlab platform.

  • data hiding in encrypted images based on predefined watermark embedding before Encryption Process
    Signal Processing-image Communication, 2016
    Co-Authors: Dalel Bouslimi, Michel Cozic, Gouenou Coatrieux, Christian Roux
    Abstract:

    In this paper, we propose a novel approach which allows embedding a message into an encrypted image; a message that can be accessed whether the image is encrypted or not. To do so, the proposed solution relies on the insertion into the image of a predefined watermark, a "pre-watermark", before the Encryption Process. Message insertion (resp. extraction) is then commonly conducted into (resp. from) the encrypted image. It is the impact of this data hiding Process onto the "pre-watermark" that gives us access to the message into the spatial domain, i.e. after the decryption Process. By doing so, the watermark Processing Process is independent of the knowledge of the Encryption key and one only just has to know the watermarking key so as to embed the message and extract it from the encrypted or decrypted image. Reciprocally, Encryption/decryption Processes are completely independent from message embedding/extraction. We illustrate the feasibility of our approach considering the RC4 stream cipher algorithm and the Least Significant Bit substitution watermarking modulation. Experiments conducted on natural test images and ultrasound medical images demonstrate the general capabilities of our system to securely make available a message in both spatial and encrypted domains while minimizing image distortion. We further discuss the use of different Encryption and watermarking algorithms and we illustrate how our system can be used for ensuring image integrity and authenticity control. HighlightsWe provide an approach of hiding a message into an encrypted image.We show that the embedded message can be read whether the image is encrypted or not.We present an implementation of our method based on LSB substitution scheme and RC4.We discuss the performances and the security of the proposed implementation.We precise how our approach can be used for verifying image reliability.

  • Data hiding in encrypted images based on predefined watermark embedding before Encryption Process
    Signal Processing: Image Communication, 2016
    Co-Authors: Dalel Bouslimi, Michel Cozic, Gouenou Coatrieux, Christian Roux
    Abstract:

    In this paper, we propose a novel approach which allows embedding a message into an encrypted image; a message that can be accessed whether the image is encrypted or not. To do so, the proposed solution relies on the insertion into the image of a predefined watermark, a “pre-watermark”, before the Encryption Process. Message insertion (resp. extraction) is then commonly conducted into (resp. from) the encrypted image. It is the impact of this data hiding Process onto the “pre-watermark” that gives us access to the message into the spatial domain, i.e. after the decryption Process. By doing so, the watermark Processing Process is independent of the knowledge of the Encryption key and one only just has to know the watermarking key so as to embed the message and extract it from the encrypted or decrypted image. Reciprocally, Encryption/decryption Processes are completely independent from message embedding/extraction. We illustrate the feasibility of our approach considering the RC4 stream cipher algorithm and the Least Significant Bit substitution watermarking modulation. Experiments conducted on natural test images and ultrasound medical images demonstrate the general capabilities of our system to securely make available a message in both spatial and encrypted domains while minimizing image distortion. We further discuss the use of different Encryption and watermarking algorithms and we illustrate how our system can be used for ensuring image integrity and authenticity control.

Ch K Volos - One of the best experts on this subject based on the ideXlab platform.

  • image Encryption Process based on chaotic synchronization phenomena
    Signal Processing, 2013
    Co-Authors: Ch K Volos, I M Kyprianidis, I N Stouboulos
    Abstract:

    This paper presents a novel image Encryption scheme, which uses a chaotic True Random Bits Generator (TRBG). The chaotic TRBG is based on the coexistence of two different synchronization phenomena. The first one is the well-known complete chaotic synchronization while the second one is a recently new proposed synchronization phenomenon, the inverse π-lag synchronization. This coexistence is observed in the case of two mutually coupled identical nonlinear circuits. The nonlinear circuit, which is used, produces double-scroll chaotic attractors. The initial conditions of the coupled system and the values of the circuit's parameters serve as the private key of the proposed cryptographic scheme. In order to face the challenge of using this chaotic TRBG in such cryptographic schemes, the produced bits sequence is subjected to statistical tests which are the well-known Federal Information Processing Standards-140-2. This bits sequence has then been used to encrypt and decrypt gray-scale images. Also, the security analysis of the encrypted image demonstrates the high security of the proposed Encryption scheme. Highlights? We develop an image Encryption scheme based on a chaotic random bits generator. ? The coexistence of synchronization phenomena is the main feature of this generator. ? The complete and the inverse π-lag are the observed synchronization phenomena. ? The nonlinear circuit, which is used, produces double-scroll chaotic attractors. ? The high security of the proposed Encryption scheme is confirmed.

  • fingerprint images Encryption Process based on a chaotic true random bits generator
    International Journal of Multimedia Intelligence and Security, 2010
    Co-Authors: Ch K Volos, I M Kyprianidis, I N Stouboulos
    Abstract:

    In recent years, information security requires randomly selected strong keys. Most of the proposed methods provide keys, which are based on chaotic cryptographic algorithms. In this paper, a fingerprint image Encryption scheme, based on a chaotic true random bit generator (TRBG), is proposed. The chaotic generator is based on a non-linear electronic circuit, which produces double scroll chaotic attractors. The initial conditions and the values of the circuit parameters serve as the private key of the cryptographic scheme. We use two chaotic generators with different initial conditions, which produce the bits sequences that XOR-ed for generating the final bits sequence. A well known statistical suite for testing the distribution of the bits sequence was adopted. This sequence has been used to encrypt and decrypt the fingerprint images. Also, the security analysis of the encrypted image demonstrates the high security of the proposed Encryption scheme.

  • image Encryption Process based on a chaotic true random bit generator
    International Conference on Digital Signal Processing, 2009
    Co-Authors: Ch K Volos, I M Kyprianidis, I N Stouboulos
    Abstract:

    In recent years, information security requires randomly selected strong keys. Most of the proposed methods provide keys based on chaotic cryptographic algorithms. In this paper, an image Encryption scheme based on a chaotic True Random Bit Generator (TRBG) is proposed. The chaotic generator is a nonlinear electronic circuit which produces double scroll chaotic attractors. The values of the circuit parameters and the initial conditions are the keys of the cryptographic scheme. Since the dynamic behavior of the circuit is so unpredictable, a true random bits sequence is produced via a well known method. We adopt the FIPS 140-1 statistical suite to test the distribution of the bits sequence. This sequence is used to encrypt and decrypt images. Also, the security analysis of the encrypted image demonstrates the high security of the proposed scheme.

Dalel Bouslimi - One of the best experts on this subject based on the ideXlab platform.

  • data hiding in encrypted images based on predefined watermark embedding before Encryption Process
    Signal Processing-image Communication, 2016
    Co-Authors: Dalel Bouslimi, Michel Cozic, Gouenou Coatrieux, Christian Roux
    Abstract:

    In this paper, we propose a novel approach which allows embedding a message into an encrypted image; a message that can be accessed whether the image is encrypted or not. To do so, the proposed solution relies on the insertion into the image of a predefined watermark, a "pre-watermark", before the Encryption Process. Message insertion (resp. extraction) is then commonly conducted into (resp. from) the encrypted image. It is the impact of this data hiding Process onto the "pre-watermark" that gives us access to the message into the spatial domain, i.e. after the decryption Process. By doing so, the watermark Processing Process is independent of the knowledge of the Encryption key and one only just has to know the watermarking key so as to embed the message and extract it from the encrypted or decrypted image. Reciprocally, Encryption/decryption Processes are completely independent from message embedding/extraction. We illustrate the feasibility of our approach considering the RC4 stream cipher algorithm and the Least Significant Bit substitution watermarking modulation. Experiments conducted on natural test images and ultrasound medical images demonstrate the general capabilities of our system to securely make available a message in both spatial and encrypted domains while minimizing image distortion. We further discuss the use of different Encryption and watermarking algorithms and we illustrate how our system can be used for ensuring image integrity and authenticity control. HighlightsWe provide an approach of hiding a message into an encrypted image.We show that the embedded message can be read whether the image is encrypted or not.We present an implementation of our method based on LSB substitution scheme and RC4.We discuss the performances and the security of the proposed implementation.We precise how our approach can be used for verifying image reliability.

  • Data hiding in encrypted images based on predefined watermark embedding before Encryption Process
    Signal Processing: Image Communication, 2016
    Co-Authors: Dalel Bouslimi, Michel Cozic, Gouenou Coatrieux, Christian Roux
    Abstract:

    In this paper, we propose a novel approach which allows embedding a message into an encrypted image; a message that can be accessed whether the image is encrypted or not. To do so, the proposed solution relies on the insertion into the image of a predefined watermark, a “pre-watermark”, before the Encryption Process. Message insertion (resp. extraction) is then commonly conducted into (resp. from) the encrypted image. It is the impact of this data hiding Process onto the “pre-watermark” that gives us access to the message into the spatial domain, i.e. after the decryption Process. By doing so, the watermark Processing Process is independent of the knowledge of the Encryption key and one only just has to know the watermarking key so as to embed the message and extract it from the encrypted or decrypted image. Reciprocally, Encryption/decryption Processes are completely independent from message embedding/extraction. We illustrate the feasibility of our approach considering the RC4 stream cipher algorithm and the Least Significant Bit substitution watermarking modulation. Experiments conducted on natural test images and ultrasound medical images demonstrate the general capabilities of our system to securely make available a message in both spatial and encrypted domains while minimizing image distortion. We further discuss the use of different Encryption and watermarking algorithms and we illustrate how our system can be used for ensuring image integrity and authenticity control.

Yanhua Wang - One of the best experts on this subject based on the ideXlab platform.