Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bahi, Jacques M, Fang, Xiaole, Guyeux, Christophe, Wang, Qianxue
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Bahi, Jacques M
Fang, Xiaole
Guyeux, Christophe
Wang, Qianxue
description Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a generator in the Internet security field.
doi_str_mv 10.48550/arxiv.1112.1201
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1112_1201</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1112_1201</sourcerecordid><originalsourceid>FETCH-LOGICAL-a651-3ce2695c466c8e3a4018755d449d4b862356a6c3894a09479f31cb0bcd2a1a353</originalsourceid><addsrcrecordid>eNotj7tqwzAYRrV0KGn3TkUvYFf3SN2CSZNAoBeydDK_JbkV2JKR7dC8fZOm08cZvgMHoQdKSqGlJE-Qf8KxpJSykjJCb9Hn-gjdDFOIX_h9hi5MJ5xaXH1DmoLFb6OfXSo-ILrU442PPsOU8viMV8PQBXs-poinhHexTbm_4ja4s-4O3bTQjf7-fxfo8LI-VNti_7rZVat9AUrSglvPlJFWKGW15yAI1UspnRDGiUYrxqUCZbk2AogRS9NyahvSWMeAApd8gR6v2r-0esihh3yqL4n1JZH_ArKdS7w</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding</title><source>arXiv.org</source><creator>Bahi, Jacques M ; Fang, Xiaole ; Guyeux, Christophe ; Wang, Qianxue</creator><creatorcontrib>Bahi, Jacques M ; Fang, Xiaole ; Guyeux, Christophe ; Wang, Qianxue</creatorcontrib><description>Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a generator in the Internet security field.</description><identifier>DOI: 10.48550/arxiv.1112.1201</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2011-12</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1112.1201$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1112.1201$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Bahi, Jacques M</creatorcontrib><creatorcontrib>Fang, Xiaole</creatorcontrib><creatorcontrib>Guyeux, Christophe</creatorcontrib><creatorcontrib>Wang, Qianxue</creatorcontrib><title>Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding</title><description>Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a generator in the Internet security field.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj7tqwzAYRrV0KGn3TkUvYFf3SN2CSZNAoBeydDK_JbkV2JKR7dC8fZOm08cZvgMHoQdKSqGlJE-Qf8KxpJSykjJCb9Hn-gjdDFOIX_h9hi5MJ5xaXH1DmoLFb6OfXSo-ILrU442PPsOU8viMV8PQBXs-poinhHexTbm_4ja4s-4O3bTQjf7-fxfo8LI-VNti_7rZVat9AUrSglvPlJFWKGW15yAI1UspnRDGiUYrxqUCZbk2AogRS9NyahvSWMeAApd8gR6v2r-0esihh3yqL4n1JZH_ArKdS7w</recordid><startdate>20111206</startdate><enddate>20111206</enddate><creator>Bahi, Jacques M</creator><creator>Fang, Xiaole</creator><creator>Guyeux, Christophe</creator><creator>Wang, Qianxue</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20111206</creationdate><title>Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding</title><author>Bahi, Jacques M ; Fang, Xiaole ; Guyeux, Christophe ; Wang, Qianxue</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a651-3ce2695c466c8e3a4018755d449d4b862356a6c3894a09479f31cb0bcd2a1a353</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Bahi, Jacques M</creatorcontrib><creatorcontrib>Fang, Xiaole</creatorcontrib><creatorcontrib>Guyeux, Christophe</creatorcontrib><creatorcontrib>Wang, Qianxue</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bahi, Jacques M</au><au>Fang, Xiaole</au><au>Guyeux, Christophe</au><au>Wang, Qianxue</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding</atitle><date>2011-12-06</date><risdate>2011</risdate><abstract>Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a generator in the Internet security field.</abstract><doi>10.48550/arxiv.1112.1201</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1112.1201
ispartof
issn
language eng
recordid cdi_arxiv_primary_1112_1201
source arXiv.org
subjects Computer Science - Cryptography and Security
title Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T15%3A06%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Evaluating%20Quality%20of%20Chaotic%20Pseudo-Random%20Generators:%20Application%20to%20Information%20Hiding&rft.au=Bahi,%20Jacques%20M&rft.date=2011-12-06&rft_id=info:doi/10.48550/arxiv.1112.1201&rft_dat=%3Carxiv_GOX%3E1112_1201%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true