Cryptanalysis-Driven Chaotic Image Encryption and Its Applications
Chaos cryptography is an inter discipline that combines chaotic theory and cryptography, which includes chaotic secure communication system, chaotic symmetric cipher, chaotic public key cipher and chaotic hash function [1]. In this academic monograph, the main object of our discussion is symmetric chaotic cryptography. The block diagram of symmetrical encryption and communication transmission is shown as Figure 1 [2]. The encryption process is ( , ) EK =CP, in which P means plaintext while K means secret key and () E ? represents encryption function. Alice sends the ciphertext which has been encrypted to Bob, the receiving end. Bob makes use of the same secret key which is sent by a secure channel to decrypt and recover the original plaintext ( , ) DK =PC, in which ()D ? is the decryption function. For an attacker Oscar, the ciphertext C is available but the secret key for the secure channel transmission is not known.
Sample Chapter(s)
Author Introduction (4 KB)
Components of the Book:
  • Author Introduction
  • Part I. Basic Principles
  • Part II. Cryptanalysis of Chaotic Image Encryption Algorithms
  • Part III. Design and Application of Chaotic Image Encryption Algorithms
Readership: Students, academics, teachers, and other people attending or interested in Cryptanalysis-Driven Chaotic Image Encryption and Its Applications.
1
Author Introduction
Heping Wen
PDF (4 KB)
1
Part I. Basic Principles
Heping Wen
PDF (433 KB)
15
Part II. Cryptanalysis of Chaotic Image Encryption Algorithms
Heping Wen
PDF (3702 KB)
83
Part III. Design and Application of Chaotic Image Encryption Algorithms
Heping Wen
PDF (6541 KB)
Heping Wen
He received PhD degree in Control Science and Engineering from Guangdong University of Technology in 2019. From 2019 to 2021, he completed postdoctoral fellow majored in Information and Communication Engineering from University of Electronic Science and Technology of China. He is currently an associate professor at Zhongshan College, University of Electronic Science and Technology of China. His research interests include image encryption, chaotic secure communication, and cryptanalysis.

Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top