Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Martinez-Gonzalez, Ricardo Francisco
- Implementation of a Stream Cipher Based on Bernoulli's Map
Abstract Views :209 |
PDF Views:107
Authors
Affiliations
1 Electrics and Electronics Department, Veracruz Institute of Technology, Veracruz, MX
2 Electronics Department, National Institute of Astrophysics Optics and Electronics, Tonantzintla, MX
1 Electrics and Electronics Department, Veracruz Institute of Technology, Veracruz, MX
2 Electronics Department, National Institute of Astrophysics Optics and Electronics, Tonantzintla, MX
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 6, No 6 (2014), Pagination: 113-121Abstract
A stream cipher was implemented on a FPGA. The keystream, for some authors the most important element, was developed using an algorithm based on Bernoulli's chaotic map. When dynamic systems are digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a mechanism was needed. The proposed mechanism gives a solution for degradation issue and its implementation is not complicated. Finally, the implemented cipher includes 8 stages and 2 pseudo-random number generators (PRNG), such cipher was tested using NIST testes. Once its designing stage, it was implemented using a developing FPGA board.Keywords
Chaotic Stream Ciphers, Digitally Implemented Bernoulli’s Map, NIST Testes, FPGA Implementation.- Steganographic Substitution of the Least Significant Bit Determined through Analysis of the Cover Image and the Encrypted Message
Abstract Views :246 |
PDF Views:124
Authors
Martha Angelica Garcia-Villa
1,
Ricardo Francisco Martinez-Gonzalez
1,
Juan Francisco Mejia-Perez
1,
Miguel Valerio-Canales
1,
Yesenia Isabel Moreno-Pavan
1
Affiliations
1 Tecnologico Nacional de Mexico/IT Veracruz, Veracruz, MX
1 Tecnologico Nacional de Mexico/IT Veracruz, Veracruz, MX
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 10, No 6 (2018), Pagination: 31-41Abstract
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the crypto-message. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.Keywords
Steganographic Scheme, Information Encryption, Substitution of the Least Significant Bits.References
- Brandao, A. S., & Jorge, D. C. (2016). Artificial neural networks applied to image steganography. IEEE Latin America Transactions, 14(3), 1361-1366.
- Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale images. IEEE multimedia, 8(4), 22-28.
- Isaza, G. A., Espinosa, C. A., & Ocampo, S. M. (2018) Análisis de técnicasesteganograficas y estegoanalisisencanalesencubiertos, imágenes y archivos de sonido.
- Divya, S. S., & Reddy, M. R. M. (2012). Hiding text in audio using multiple LSB steganography and provide security using cryptography. International journal of scientific & technology research, 1(6), 68-70.
- Jamal A. Othman.(2014). Steganographic scheme to avoid statistical Steganalysis. JOURNAL OF THE COLLEGE OF EDUCATION FOR WOMEN, 25(1), 249-256.
- Wu, H. Z., Wang, H. X., & Shi, Y. Q. (2016). Can Machine Learn Steganography?-Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. arXiv preprint arXiv:1606.05294.
- Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
- Li, S., Chen, G., &Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International journal of Bifurcation and Chaos, 15(10), 3119-3151.
- Zhang, T., & Ping, X. (2003). A new approach to reliable detection of LSB steganography in natural images. Signal processing, 83(10), 2085-2093.
- Al-Fadhel, T. A. (2007). Gauss map vs Bernoulli shift. Applied Mathematics and Computation, 194(2), 520-526.
- Miri, A., &Faez, K. (2017). Adaptive image steganography based on transform domain via genetic algorithm. Optik-International Journal for Light and Electron Optics, 145, 158-168.
- Kumar, V., & Kumar, D. (2017). A modified DWT-based image steganography technique. Multimedia Tools and Applications, 1-30.
- Ghebleh, M., &Kanso, Ax. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.