Chaos and cryptography: block encryption ciphers based on chaotic maps
G Jakimoski, L Kocarev - … transactions on circuits and systems i …, 2001 - ieeexplore.ieee.org
This paper is devoted to the analysis of the impact of chaos-based techniques on block
encryption ciphers. We present several chaos based ciphers. Using the well-known …
encryption ciphers. We present several chaos based ciphers. Using the well-known …
Adaptive data hiding in edge areas of images with spatial LSB domain systems
CH Yang, CY Weng, SJ Wang… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper proposes a new adaptive least-significant-bit (LSB) steganographic method
using pixel-value differencing (PVD) that provides a larger embedding capacity and …
using pixel-value differencing (PVD) that provides a larger embedding capacity and …
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
CC Chang, JY Hsiao, CS Chan - Pattern Recognition, 2003 - Elsevier
The processing of simple least-significant-bit (LSB) substitution embeds the secret image in
the least significant bits of the pixels in the host image. This processing may degrade the …
the least significant bits of the pixels in the host image. This processing may degrade the …
Logistic map as a block encryption algorithm
L Kocarev, G Jakimoski - Physics Letters A, 2001 - Elsevier
We discuss the relationship between cryptography and chaos theory, and similarities of their
crucial concepts such as mixing property and sensitivity to changes in initial conditions and …
crucial concepts such as mixing property and sensitivity to changes in initial conditions and …
Use of chaotic dynamical systems in cryptography
R Schmitz - Journal of the Franklin Institute, 2001 - Elsevier
In this paper, some of the mathematical properties relevant to the use of chaotic dynamical
systems in cryptography are identified and reviewed. We evaluate these properties for some …
systems in cryptography are identified and reviewed. We evaluate these properties for some …
A data hiding scheme using the varieties of pixel-value differencing in multimedia images
CH Yang, CY Weng, HK Tso, SJ Wang - Journal of Systems and Software, 2011 - Elsevier
In this paper, a capacity promoting technique is proposed for embedding data in an image
using pixel-value differencing (PVD). The PVD scheme embeds data by changing the …
using pixel-value differencing (PVD). The PVD scheme embeds data by changing the …
High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting
Difference expansion and histogram shifting methods are two popular hiding strategies that
have been widely used in many researches. For example, Hong and Chen developed a …
have been widely used in many researches. For example, Hong and Chen developed a …
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels
CC Chang, CS Chan, YH Fan - Pattern Recognition, 2006 - Elsevier
In this paper, we shall propose a novel image-hiding scheme. Our new scheme classifies
the host image pixels into two groups of pixels according to the pixel values. For each group …
the host image pixels into two groups of pixels according to the pixel values. For each group …
Near-optimal solution to pair-wise LSB matching via an immune programming strategy
H Xu, J Wang, HJ Kim - Information Sciences, 2010 - Elsevier
In this paper, a novel steganographic method is proposed employing an immune
programming strategy to find a near-optimal solution for the pair-wise least-significant-bit …
programming strategy to find a near-optimal solution for the pair-wise least-significant-bit …
[PDF][PDF] Design and FPGA implementation of Lorenz chaotic system for information security issues
Taking the Lorenz chaotic system as an example, FPGA (Field Programmable Gate Array)
technology is applied to obtain chaotic sequence in this paper, the Xilinx system generator …
technology is applied to obtain chaotic sequence in this paper, the Xilinx system generator …