Journal
ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING
Volume 69, Issue 1, Pages 49-58Publisher
SPRINGER
DOI: 10.1007/s10470-011-9627-4
Keywords
Encryption; Ciphering; Differential attack; Exhaustive attack; Statistical attack; Session key; Evolutionary algorithms
Ask authors/readers for more resources
Increasing information transmission in public networks raises a significant number of questions. For example, the security, the confidentiality, the integrity and the authenticity of the data during its transmission are very problematical. So, encryption of the transmitted data is one of the most promising solutions. In our work, we focus on the security of image data, which are considered as specific data because of their big size and their information which are of two-dimensional nature and also redundant. These data characteristics make the developed algorithms in the literature unavailable in their classical forms, because of the speed and the possible risk of information loss. In this paper, we develop an original images encryption'' algorithm based on evolutionary algorithms. The appropriateness of the proposed scheme is demonstrated by the sensitivity to images, the key and the resistibility to various advanced attacks.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available