In this paper, we propose an effective gray image cryptosystem containing Arnold cat map for pixel permutation and an improved Logistic map for the generation of encryption keys to be used for pixel modification. Firstly, a new chaotic map is designed to show better performance than the standard one in terms of key space range, complexity and uniformity. Generated secret key is not only sensitive to the control parameters and initial condition of the improved map but also strongly depend on the plain image characteristic which provides an effective resistance against statistical and differential attacks. Additionally, to get higher encryption strength of the cryptosystem, both confusion and diffusion processes are performed with different keys in every iterations. Theoretical analysis and simulation results confirm that the proposed algorithm has superior security and effectively encrypts and decrypts the gray images as well.
Steganography is a science of security technique through invisible communication; hiding secret message into cover objects without any suspicion. Protection of the hidden information from an adversary is the main purpose of any steganography system even if the embedding method is obvious. In this paper, an effective image steganography system based on a least significant bit (LSB) algorithm and chaos is proposed. The proposed method contains a spatial domain technique in which the Logistic map is used for generating chaotic bitstream and bitwise XOR operation which is used to create control bit. Control bit determines whether the LSB of a specific pixel is changed or not according to the secret message. This provides direct manipulation over the pixels of the image with a very low precision hence enhances the system security. In this study, gray image is used as secret message and a larger scale image as cover image. Experimental results demonstrate that the proposed method is very efficient to detect LSB replacement in the algorithm. Moreover, the proposed algorithm is highly sensitive to the stego key parameters due to complex structure of chaos which provides high level of security in the whole system and effectively hides and detects the image information.
Data communication security between power systems, which has become a chronic problem in the classical network, is characterized by the application of information communication technology (ICT) in modern network models. Nowadays, the electricity network is spread over very large areas, and the load taking, and load shedding instructions are transmitted one-way and unsafe in the current structure. However, utilities in the smart grid are developing new methodologies to secure the communication infrastructure. This article presents a design that will make the current grid model more reliable and provide a secure data communication in accordance with the modern grid infrastructure. This design provides auxiliary communication codes such as chaotic codes embedded in the communication instructions between power systems, which are generation balance instructions sent to the power plants by the load dispatch center to achieve frequency balance. Used as a case study, one-day instructions are transmitted and encoded four times a day, which is the amount of capacity that only the receiver and transmitter can understand with two-sided encryption. The necessary reserve capacity, chaotic encryption and suitability for real-time applications were evaluated using experimentally obtained power system data for frequency control, which is very important in terms of sustainability in energy and economy against cyber-attacks, and very accurate results were obtained.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.