Communication
Ghada K. Emad; Soukaena Hassan Hashiem
Abstract
Recently, the growth of data transmission through various networks has the necessity for an elevated level of security. Encryption is one of the essential technologies for protecting and ensuring the integrity of IoT devices. Secure communication among constrained devices is critical during data transmission ...
Read More ...
Recently, the growth of data transmission through various networks has the necessity for an elevated level of security. Encryption is one of the essential technologies for protecting and ensuring the integrity of IoT devices. Secure communication among constrained devices is critical during data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for devices with limited computational functions and memory. On the other hand, most lightweight algorithms suffer from a trade-off between complexity and speed to produce a robust cipher algorithm. This paper evaluates the effectiveness of an image encryption technique that uses a Lightweight GIFT algorithm and logistic map equation-based dynamic DNA coding to create a secure, lightweight cipher algorithm for IoT devices. When we employed dynamic DNA coding by the binary bit method, we observed that the developed approach is more secure and has a high level of randomness due to the results. Additionally, the correlation between nearby pixels is approximately zero; there is no association between the two images. Therefore, the developed approach achieves a higher encryption efficiency when compared to the original algorithm.
Nashwan Alsalam Ali; Abdul Monem S Rahma; Shaimaa h. Shaker
Abstract
The widespread of recent multimedia, including various 3D model applications in different domains of areas, may lead to 3D models being stolen and attacked by hackers. Moreover, 3D models must be protected from unauthorized users and when transmitting over the internet. Nowadays the 3D model protection ...
Read More ...
The widespread of recent multimedia, including various 3D model applications in different domains of areas, may lead to 3D models being stolen and attacked by hackers. Moreover, 3D models must be protected from unauthorized users and when transmitting over the internet. Nowadays the 3D model protection is a very important issue. This paper proposed a scheme that provides high protection for the textured 3D model by implementing multiple levels of security. The first level of security is achieved by encrypting the texture map based on a key generated by a 2D Logistic chaotic map. The second level of security is implemented by modifying the vertices values of the 3D mesh based on keys generated by the 3D Lorenz chaotic map. The proposed scheme was implemented on various 3D textured models varying in the number of vertices and faces. The experimental results show that the proposed scheme has a good encryption and provides high security by completely deforms the whole texture and 3D mesh of the textured 3D model into the two levels. The encryption scheme has a large key space 10135 making the scheme resists violent attacks. The Hausdorff Distance (HD) and histogram metrics are adopted to calculate the matching degree between the original and extracted model. The results show that the original and extracted model are identical through the values of HD, which are approximate to zero, and the histogram visually is similar.