Chaos and cryptography: block encryption ciphers based on chaotic maps

G Jakimoski, L Kocarev - … transactions on circuits and systems i …, 2001 - ieeexplore.ieee.org
This paper is devoted to the analysis of the impact of chaos-based techniques on block
encryption ciphers. We present several chaos based ciphers. Using the well-known …

Adaptive data hiding in edge areas of images with spatial LSB domain systems

CH Yang, CY Weng, SJ Wang… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper proposes a new adaptive least-significant-bit (LSB) steganographic method
using pixel-value differencing (PVD) that provides a larger embedding capacity and …

Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy

CC Chang, JY Hsiao, CS Chan - Pattern Recognition, 2003 - Elsevier
The processing of simple least-significant-bit (LSB) substitution embeds the secret image in
the least significant bits of the pixels in the host image. This processing may degrade the …

Logistic map as a block encryption algorithm

L Kocarev, G Jakimoski - Physics Letters A, 2001 - Elsevier
We discuss the relationship between cryptography and chaos theory, and similarities of their
crucial concepts such as mixing property and sensitivity to changes in initial conditions and …

Use of chaotic dynamical systems in cryptography

R Schmitz - Journal of the Franklin Institute, 2001 - Elsevier
In this paper, some of the mathematical properties relevant to the use of chaotic dynamical
systems in cryptography are identified and reviewed. We evaluate these properties for some …

A data hiding scheme using the varieties of pixel-value differencing in multimedia images

CH Yang, CY Weng, HK Tso, SJ Wang - Journal of Systems and Software, 2011 - Elsevier
In this paper, a capacity promoting technique is proposed for embedding data in an image
using pixel-value differencing (PVD). The PVD scheme embeds data by changing the …

High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting

TC Lu, CC Chang, YH Huang - Multimedia tools and applications, 2014 - Springer
Difference expansion and histogram shifting methods are two popular hiding strategies that
have been widely used in many researches. For example, Hong and Chen developed a …

Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels

CC Chang, CS Chan, YH Fan - Pattern Recognition, 2006 - Elsevier
In this paper, we shall propose a novel image-hiding scheme. Our new scheme classifies
the host image pixels into two groups of pixels according to the pixel values. For each group …

Near-optimal solution to pair-wise LSB matching via an immune programming strategy

H Xu, J Wang, HJ Kim - Information Sciences, 2010 - Elsevier
In this paper, a novel steganographic method is proposed employing an immune
programming strategy to find a near-optimal solution for the pair-wise least-significant-bit …

[PDF][PDF] Design and FPGA implementation of Lorenz chaotic system for information security issues

L Merah, A Ali-Pacha, NH Said… - Applied Mathematical …, 2013 - m-hikari.com
Taking the Lorenz chaotic system as an example, FPGA (Field Programmable Gate Array)
technology is applied to obtain chaotic sequence in this paper, the Xilinx system generator …