STUDYING THE PROPERTIES OF PIXELS PERMUTATIONS BASED ON DISCRETIZED STANDARD MAP
Article Sidebar
Open full text
Issue Vol. 10 No. 1 (2020)
-
APPLICATION OF HURST INDICATOR TO CHOOSE AN ALGORITHM FOR RESOURCE CONTROL OF A TELECOMMUNICATION NETWORK
Anton Vrublevskiy, Ivan Lesovoy, Gennadij Pylypenko4-7
-
BLOCK CIPHERS ON THE BASIS OF REVERSIBLE CELLULAR AUTOMATA
Yuliya Tanasyuk, Petro Burdeinyi8-11
-
TIME INTERVAL SWITCHING DEVICE
Ruslan Politanskyi, Andrij Veryga12-15
-
ENVIRONMENT OF ELECTROMAGNETIC COMPATIBILITY OF RADIO-ELECTRONIC COMMUNICATION MEANS
Heorhii Rozorinov, Oleksandr Hres, Volodymyr Rusyn, Petro Shpatar16-19
-
THE GENERATING RANDOM SEQUENCES WITH THE INCREASED CRYPTOGRAPHIC STRENGTH
Volodymyr Korchynskyi, Vitalii Kildishev, Oleksandr Riabukha, Oleksandr Berdnikov20-23
-
THE INCREASE OF THE ENERGY EFFICIENCY OF THE RADIO EQUIPMENT BASED ON THE USE OF MODULATION BY ORTHOGONAL HARMONIC CARRIERS
Sergey Toliupa, Vladimir Nakonechnyi, Alexander Trush24-27
-
SYNTHESIS OF SAFE BEHAVIOR ALGORITHMS OF RADIOELECTRONIC SYSTEMS FOR CRITICAL APPLICATIONS
Leonid Ozirkovskyy, Bohdan Volochiy, Mykhailo Zmysnyi, Oleksandr Shkiliuk28-31
-
METHOD FOR ASSESSING THE STRUCTURAL RELIABILITY OF NETWORKS WITH UNDETERMINED TOPOLOGY
Nina Kniazieva, Alexey Nenov, Irina Kolumba32-35
-
PHOTODIODE BASED ON THE EPITAXIAL PHOSPHIDE GALLIUM WITH INCREASED SENSITIVITY AT A WAVELENGTH OF 254 nm
Yurii Dobrovolsky, Volodymyr M. Lipka, Volodymyr V. Strebezhev, Yurii O. Sorokatyi, Mykola O. Sorokatyi, Olga P. Andreeva36-39
-
DETERMINATION OF THE STRUCTURAL STATE AND STABILITY OF THE LASER CRYSTALLIZED Cd1-xМnxTe CRYSTAL SURFACE
Victor Strebezhev, Ivan Yuriychuk, Petro Fochuk, Sergiy Nichyi, Yuriy Dobrovolsky, Victoria Tkachuk, Mykola Sorokatyi, Yurii Sorokatyi40-43
-
TECHNOLOGY AND MEASUREMENTS OF MAGNETORESISTANCE IN THIN-LAYERED FERROMAGNETIC STRUCTURES
Jakub Kisała, Karolina Czarnacka, Mateusz Gęca, Andrzej Kociubiński44-47
-
STUDYING THE PROPERTIES OF PIXELS PERMUTATIONS BASED ON DISCRETIZED STANDARD MAP
Serhii Haliuk, Oleh Krulikovskyi, Vitalii Vlasenko48-51
-
FACE RECOGNITION TECHNIQUES
Olexandr N. Romanyuk, Sergey I. Vyatkin, Sergii V. Pavlov, Pavlo I. Mykhaylov, Roman Y. Chekhmestruk, Ivan V. Perun52-57
-
INVESTIGATION OF THE KOLMOGOROV-WIENER FILTER FOR CONTINUOUS FRACTAL PROCESSES ON THE BASIS OF THE CHEBYSHEV POLYNOMIALS OF THE FIRST KIND
Vyacheslav Gorev, Alexander Gusev, Valerii Korniienko58-61
-
MODELLING OF SPINTRONIC DEVICES FOR APPLICATION IN RANDOM ACCESS MEMORY
Ruslan Politanskyi, Maria Vistak, Andriy Veryga, Tetyana Ruda62-65
-
HARDWARE AND SOFTWARE MEANS FOR ELECTRONIC COMPONENTS AND SENSORS RESEARCH
Gryhoriy Barylo, Oksana Boyko, Ihor Gelzynskyy, Roman Holyaka, Zenon Hotra, Tetyana Marusenkova, Mykola Khilchuk, Magdalena Michalska66-71
-
WAYS TO PRODUCE RENEWABLE ENERGY FROM CARBON DIOXIDE
Natalia Grigorieva, Viktor Shabaykovich, Larysa Gumeniuk, Pavlo Humeniuk, Lubov Dobrovolska, Dmitry Sobchuk72-76
-
SATURATION OF THE ABSORPTION OF THERMAL RADIATION BY ATMOSPHERIC CARBON DIOXIDE
Jan Kubicki, Krzysztof Kopczyński, Jarosław Młyńczak77-81
-
CLASSIFICATION OF MULTIDIMENSIONAL POLARIZATION MICROSCOPY RESULTS IN THE TECHNOLOGY OF FORENSIC INTELLECTUAL MONITORING OF HEART DISEASES
Oleg Vanchulyak, Serhii Golub, Mariia Talakh, Vyacheslav Gantyuk82-86
Archives
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
-
Vol. 9 No. 4
2019-12-16 20
-
Vol. 9 No. 3
2019-09-26 20
-
Vol. 9 No. 2
2019-06-21 16
-
Vol. 9 No. 1
2019-03-03 13
-
Vol. 8 No. 4
2018-12-16 16
-
Vol. 8 No. 3
2018-09-25 16
-
Vol. 8 No. 2
2018-05-30 18
-
Vol. 8 No. 1
2018-02-28 18
Main Article Content
DOI
Authors
Abstract
In this article, we described specifics of pixels permutations based on the discretized, two-dimensional Chirikov standard map. Some properties of the discretized Chirikov map can be used by an attacker to recover the original images that are studied. For images with dimensions N ´ N the vulnerability of permutations allows for brute force attacks, and shown is the ability of an intruder to restore the original image without setting the value of keys permutations. Presented is also, successful cryptographic attack on the encrypted image through permutation of pixels. It is found that for images with dimension N ´ N the maximum number of combinations is equal to NN-1. A modified Chirikov map was proposed with improved permutation properties, due to the use of two nonlinearities, that increase the keys space to N2!.
Keywords:
References
Alvarez, G., Li, S. J.: Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. Inter. Journal of Bif. and Chaos 16(8)/2006, 2129–2151. DOI: https://doi.org/10.1142/S0218127406015970
Argyris A., Syvridis D., Larger L., Annovazzi-Lodi V., Colet P., Fischer I., García-Ojalvo J., Mirasso C.R., Pesquera L., Shore K.A.: Chaos-based communications at high bit rates using commercial fibre-optic links. Nature 438(7066)/2005, 343–346. DOI: https://doi.org/10.1038/nature04275
Arroyo D., Alvarez G., Fernandez V.: A basic framework for the cryptanalysis of digital chaos-based cryptography. Proc. of the 6th International Multi-Conference on Systems, Signals and Devices, Djerba 2009, 58–63. DOI: https://doi.org/10.1109/SSD.2009.4956652
Chirikov B. V.: Research concerning the theory of nonlinear resonance and stochasticity Preprint 267, Institute of Nuclear Physics, Novosibirsk, 1969, (Engl. Trans., CERN Trans. 1971, 71–40).
Fridrich J.: Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. Inter. Journal of Bif. and Chaos 8(6)/1998, 1259–284. DOI: https://doi.org/10.1142/S021812749800098X
Hussain I., Shah T.: Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics 74/2013, 869–904. DOI: https://doi.org/10.1007/s11071-013-1011-8
Jolfaei A., Mirghadri A.: An image encryption approach using chaos and stream cipher. Journal of Theoretical and Applied Information Technology 19(2)/2010, 117–125.
Kocarev L., Lian S. (Eds.): Chaos-Based Cryptography Theory, Algorithms and Applications. Springer-Verlag Berlin Heidelberg, 2011. DOI: https://doi.org/10.1007/978-3-642-20542-2
Lian S. G., Sun J., Wang Z.: A block cipher based on a suitable use of chaotic standard map. Chaos, Solitons and Fractals 26(1)/2005, 117–29. DOI: https://doi.org/10.1016/j.chaos.2004.11.096
Lian S., Sun J., Wang Z.: Security analysis of a chaos-based image encryption algorithm. Phisyca A 351(2)/2005, 645–661. DOI: https://doi.org/10.1016/j.physa.2005.01.001
National Institute of Standards and Technology (May 11, 2010). NIST Digital Library of Mathematical Functions. Section 26.4. Retrieved August 30, 2010.
Solak, E., Cokal, C., Yildiz, O.T., Biyikoglu, T.: Cryptanalysis of fridrich’s chaotic image encryption. Int. J. Bifurcation Chaos 20(5), 1405–1413. DOI: https://doi.org/10.1142/S0218127410026563
von Bremen H. F., Udwadia F. E., Proskurowski W.: An efficient QR based method for the computation of Lyapunov exponents. Physica D 101/1997, 1–16. DOI: https://doi.org/10.1016/S0167-2789(96)00216-3
Warren H. S. .: Hacker’s Delight. Addison-Wesley Professional. 2012.
Yuan G., Yorke J. A.: Collapsing of chaos in one dimensional maps. Physica D: Nonlinear Phenomena 136/2000, 18–30. DOI: https://doi.org/10.1016/S0167-2789(99)00147-5
Article Details
Abstract views: 413
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
