An Adaptive Image Encryption Scheme Guided by Fuzzy Models

08/16/2022
by   Mahdi Shariatzadeh, et al.
0

A new image encryption scheme using the advanced encryption standard (AES), a chaotic map, a genetic operator, and a fuzzy inference system is proposed in this paper. In this work, plain images were used as input, and the required security level was achieved. Security criteria were computed after running a proposed encryption process. Then an adaptive fuzzy system decided whether to repeat the encryption process, terminate it, or run the next stage based on the achieved results and user demand. The SHA-512 hash function was employed to increase key sensitivity. Security analysis was conducted to evaluate the security of the proposed scheme, which showed it had high security and all the criteria necessary for a good and efficient encryption algorithm were met. Simulation results and the comparison of similar works showed the proposed encryptor had a pseudo-noise output and was strongly dependent upon the changing key and plain image.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/20/2017

Multi-color image compression-encryption algorithm based on chaotic system and fuzzy transform

In this paper an algorithm for multi-color image compression-encryption ...
research
12/10/2021

An Evaluation and Enhancement of Seredynski-Bouvry CA-based Encryption Scheme

In this paper, we study a block cipher based on cellular automata, propo...
research
09/23/2018

Insufficient properties of image encryption algorithms

We analyze the security of recently proposed image encryption scheme [1]...
research
05/18/2019

Discrete Logarithmic Fuzzy Vault Scheme

In this paper a three fuzzy vault schemes which integrated with discrete...
research
01/13/2020

Data hiding in speech signal using steganography and encryption

Data privacy and data security are always on highest priority in the wor...
research
08/16/2022

A New Scheme for Image Compression and Encryption Using ECIES, Henon Map, and AEGAN

Providing security in the transmission of images and other multimedia da...
research
09/28/2018

A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems

In this paper, we propose a novel biometric cryptosystem for vectorial b...

Please sign up or login with your details

Forgot password? Click here to reset