Chaotic Genetic-fuzzy Encryption Technique

  • M. Mousa H
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

As the result of increasing use of internet in daily communication and the importance of information security during data storage and transmission process, we propose iterative Chaotic Genetic-fuzzy Encryption Technique(C-GET) in order to enhance secured encryption technique and less predictable. In this technique,binarize any digital data type. The main encryption stages of C-GET are chaotic map functions, fuzzy logic and genetic operations. Mathematic operations and rotation are also included that increase encryption quality. Images are used for testing propose. For testing C-GET,digitalimagesareusedbecause they become an important resource of communication. The original and reconstructed data are identical. Experimental results show that C-GET technique has multilayer protection stages against various attacks and a powerful security based on the multi-stages, multiple parameters, fuzzy logic and genetic operations. Decrypted data is nearly randomness and has negligible correlation with secret data.

Cite

CITATION STYLE

APA

M. Mousa, H. (2018). Chaotic Genetic-fuzzy Encryption Technique. International Journal of Computer Network and Information Security, 10(4), 10–19. https://doi.org/10.5815/ijcnis.2018.04.02

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free