On The Security Of A Class Of Diffusion Mechanisms For Image Encryption - 2017


The need for quick and robust image cryptosystems motivates researchers to develop new techniques to apply ancient cryptographic primitives so as to take advantage of the intrinsic options of digital pictures. One amongst the most common and mature technique is the utilization of complicated dynamic phenomena, including chaotic orbits and quantum walks, to come up with the desired key stream. During this paper, under the belief of plaintext attacks we have a tendency to investigate the protection of a classic diffusion mechanism (and of its variants) used as the core cryptographic primitive in some image cryptosystems based on the aforementioned complicated dynamic phenomena. We tend to have theoretically found that regardless of the key schedule process, the information complexity for recovering each part of the equivalent secret key from these diffusion mechanisms is solely O(one). The proposed analysis is validated by means that of numerical examples. Some additional cryptographic applications of this paper also are mentioned.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here offering final year Java Based Information Security MTech Projects, Information Security IEEE Projects, IEEE Information Security Projects, Information Security MS Projects, Java Based Information Security BTech
PROJECT TITLE :Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing - 2018ABSTRACT:Virtualized infrastructure in cloud computing has become an enticing target for cyberattackers to
PROJECT TITLE :Transmit-Power Minimization for NOMA-Enabled Traffic Offloading With Security Provisioning - 2018ABSTRACT:Non-orthogonal multiple access (NOMA) has been proposed as an effective technique to deal with the enormous
PROJECT TITLE :Beamforming Optimization for Physical Layer Security in MISO Wireless Networks - 2018ABSTRACT:A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped
PROJECT TITLE :A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet - 2018ABSTRACT:Cyber physical systems (CPSs) are increasingly being adopted in a very big selection of industries

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry