Journal:Informatica
Volume 31, Issue 4 (2020), pp. 793–820
Abstract
This paper proposes a new family of 4-dimensional chaotic cat maps. This family is then used in the design of a novel block-based image encryption scheme. This scheme is composed of two independent phases, a robust light shuffling phase and a masking phase which operate on image-blocks. It utilizes measures of central tendency to mix blocks of the image at hand to enhance security against a number of cryptanalytic attacks. The mixing is designed so that while encryption is highly sensitive to the secret key and the input image, decryption is robust against noise and cropping of the cipher-image. Empirical results show high performance of the suggested scheme and its robustness against well-known cryptanalytic attacks. Furthermore, comparisons with existing image encryption methods are presented which demonstrate the superiority of the proposed scheme.
Pub. online:1 Jan 2017Type:Research ArticleOpen Access
Journal:Informatica
Volume 28, Issue 4 (2017), pp. 629–649
Abstract
World has become a global village after introduction of social media and social networks. However, it extensively increased the demand for network resources, particularly multimedia traffic like images, videos and audio. The medium for this extensive traffic is always public networks such as internet or cellular networks. But the open nature of such network like internet always creates security threats for data during transmission. Due to many intrinsic features and higher correlation in multimedia traffic, existing encryption algorithms are not very convincing to perform well under critical scenarios. Therefore, many people in the research community are still working to propose new encryption schemes which can address these issues and handle multimedia traffic effectively on public networks. In this paper, we explore the weaknesses of existing encryption schemes, which compromise in many scenarios due to high correlation of multimedia traffic. To tackle this issue we proposed certain enhancements in an existing scheme. Our enhanced modification includes addition of bitwise XORed operation using non-linear chaotic algorithm. Performance of enhanced scheme is tested against state of the art security parameters. Efficiency of the proposed scheme is also validated via entropy, correlation, peak signal to noise ratio, unified average change intensity and number of pixels change rate tests.
Journal:Informatica
Volume 14, Issue 2 (2003), pp. 181–194
Abstract
We consider a generalized model of neural network with a fuzziness and chaos. The origin of the fuzzy signals lies in complex biochemical and electrical processes of the synapse and dendrite membrane excitation and the inhibition mechanism. The mathematical operations included into fuzzy neural network modeling are: the scalar product between inputs of layers and synaptic weights is replaced by a fuzzy logic multiplication, the sum of products changes to the fuzzy logic sums, and the operators such as supremum, maximum, and minimum are presented for a fuzzy description. The algorithm of varying membership functions, built basing on a backpropagation paradigm and a method of fuzzy neural optimization, has been considered. Both fuzzy properties and a chaos phenomenon are analyzed basing upon experimental computations.