2022
DOI: 10.1002/cpe.7187
|View full text |Cite
|
Sign up to set email alerts
|

Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication

Abstract: This article puts forward a fast chaos-RSA-based hybrid cryptosystem to secure and authenticate secret images. The SHA-512 is used to generate a 512-bit initial key.The RSA system is used to encrypt the initial secret key and signature generation for both the sender and image authentication. In fact, a powerful block-cipher algorithm is developed to encrypt and decrypt images with a high level of security. At this stage, a strong PRNG based on four chaotic systems is propounded to generate high-quality keys. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…Its primary function is to verify data integrity, i.e., that the data has not been modified in any way. Digital signatures [12,13,14] and Keyed-Hash Message Authentication Code [15,16] are most commonly used to authenticate images.…”
Section: Cryptography-based Image Authenticationmentioning
confidence: 99%
“…Its primary function is to verify data integrity, i.e., that the data has not been modified in any way. Digital signatures [12,13,14] and Keyed-Hash Message Authentication Code [15,16] are most commonly used to authenticate images.…”
Section: Cryptography-based Image Authenticationmentioning
confidence: 99%
“…While traditional pseudo-random sequences are generated by multi-level shift registers or other delay elements through linear feedback [10] , chaotic sequences can be generated with only one model and initial conditions, which is very convenient and can effectively reduce the hardware resource consumption. Chaotic cryptography is used in several applications, such as medical, radar [11] , spread spectrum communication [12] , secure communication [13] , ultra-wideband communication [14] , multimedia information encryption [15][16][17][18] , etc., and is usually combined with traditional encryption methods, such as Arnold map, RSA algorithm [19] , AES algorithm [20] , to increase the overall cryptosystem complexity and security of the whole encryption system. The literature [21] uses chaotic sequences combined with fractal structures, cellular automata and linear feedback shift registers for medical images to perform multiple diffusion operations, and the complex encryption system is implemented in hardware.…”
Section: Introductionmentioning
confidence: 99%