A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic

Gespeichert in:
Bibliographische Detailangaben
Titel: A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic
Autoren: Mendez Luis, Ladino Daniel, Amaya Isabel, Alvarado Deicy
Quelle: Multimed Tools Appl
Verlagsinformationen: Springer Science and Business Media LLC, 2023.
Publikationsjahr: 2023
Schlagwörter: Image Encryption, Artificial intelligence, Chaotic, Encryption, Geometry, Article, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Compressive Sensing, Artificial Intelligence, Computer engineering, Computer security, FOS: Mathematics, Key (lock), Cryptosystem, Chaos-based Image Encryption Techniques, Arithmetic, Digital Image Watermarking Techniques, Computer science, Information Embedding, Quaternion, Algorithm, Operating system, Color Image Encryption, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, Mathematics
Beschreibung: Based on the combination of quaternion numbers, residual matrices, and chaotic attractors, a new cryptosystem is proposed for multimedia processing files such as images and audio. The key employed in this encryption schema consists of an image with a wide and sensitive range, obtained from the Julia Quaternion set rendered using a computational tool. Due to the use of quaternion matrices mixing the information between RGB layers and audio samples was possible, whereas using XOR operation and residual matrices modulus 257, added high sensitivity to small perturbations during encryption, key preparation and decryption processes, to such an extent that a minimal change in the image or in the audio leads to a totally different encryption result. The use of dynamic programming also reduced the processing time for matrix operations on the $\mathbb {Z}_{257}$ ℤ 257 ring. To corroborate security of the algorithm, different tests were performed, including the National Institute of Standards and Technology test obtaining different indicators that were compared with other scientific references of similar works, finding behavioral patterns in accordance with those referenced works.
Publikationsart: Article
Other literature type
Sprache: English
ISSN: 1573-7721
1380-7501
DOI: 10.1007/s11042-023-14475-1
DOI: 10.60692/9faeq-m1x29
DOI: 10.60692/avg5s-0hc62
Zugangs-URL: https://pubmed.ncbi.nlm.nih.gov/37362649
Rights: CC BY
URL: http://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (http://creativecommons.org/licenses/by/4.0/) .
Dokumentencode: edsair.doi.dedup.....e7484ae1e94ed1a97c22e5f61b33a30a
Datenbank: OpenAIRE
Beschreibung
Abstract:Based on the combination of quaternion numbers, residual matrices, and chaotic attractors, a new cryptosystem is proposed for multimedia processing files such as images and audio. The key employed in this encryption schema consists of an image with a wide and sensitive range, obtained from the Julia Quaternion set rendered using a computational tool. Due to the use of quaternion matrices mixing the information between RGB layers and audio samples was possible, whereas using XOR operation and residual matrices modulus 257, added high sensitivity to small perturbations during encryption, key preparation and decryption processes, to such an extent that a minimal change in the image or in the audio leads to a totally different encryption result. The use of dynamic programming also reduced the processing time for matrix operations on the $\mathbb {Z}_{257}$ ℤ 257 ring. To corroborate security of the algorithm, different tests were performed, including the National Institute of Standards and Technology test obtaining different indicators that were compared with other scientific references of similar works, finding behavioral patterns in accordance with those referenced works.
ISSN:15737721
13807501
DOI:10.1007/s11042-023-14475-1