tailieunhanh - Báo cáo hóa học: " Research Article Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes"

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes | Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 2007 Article ID 48179 16 pages doi 2007 48179 Research Article Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes Michael Gschwandtner Andreas Uhl and Peter Wild Department of Computer Sciences Salzburg University Jakob-Haringerstr. 2 5020 Salzburg Austria Correspondence should be addressed to Andreas Uhl uhl@ Received 30 March 2007 Revised 10 July 2007 Accepted 3 September 2007 Recommended by Stefan Katzenbeisser This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error robustness to be highly dependent on the type of error occurring and to be very different as compared to the effects when using traditional block ciphers like AES. Additionally chaotic-mixing-based encryption schemes are shown to be robust to lossy compression as long as the security requirements are not too high. This property facilitates the application of these ciphers in scenarios where lossy compression is applied to encrypted material which is impossible in case traditional ciphers should be employed. If high security is required chaotic mixing loses its robustness to transmission errors and compression still the lower computational demand may be an argument in favor of chaotic mixing as compared to traditional ciphers when visual data is to be encrypted. Copyright 2007 Michael Gschwandtner et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. INTRODUCTION A significant amount of encryption schemes specifically tailored to visual data types has been proposed in literature during the last years see 9 20 for extensive overviews . The most prominent

TÀI LIỆU LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.