Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding
Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Bahi, Jacques M Fang, Xiaole Guyeux, Christophe Wang, Qianxue |
description | Guaranteeing the security of information transmitted through the Internet,
against passive or active attacks, is a major concern. The discovery of new
pseudo-random number generators with a strong level of security is a field of
research in full expansion, due to the fact that numerous cryptosystems and
data hiding schemes are directly dependent on the quality of these generators.
At the conference Internet`09, we described a generator based on chaotic
iterations which behaves chaotically as defined by Devaney. In this paper which
is an extension of the work presented at the conference Internet`10, the
proposal is to improve the speed, the security, and the evaluation of this
generator, to make its use more relevant in the Internet security context. In
order to do so, a comparative study between various generators is carried out
and statistical results are improved. Finally, an application in the
information hiding framework is presented with details, to give an illustrative
example of the use of such a generator in the Internet security field. |
doi_str_mv | 10.48550/arxiv.1112.1201 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1112_1201</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1112_1201</sourcerecordid><originalsourceid>FETCH-LOGICAL-a651-3ce2695c466c8e3a4018755d449d4b862356a6c3894a09479f31cb0bcd2a1a353</originalsourceid><addsrcrecordid>eNotj7tqwzAYRrV0KGn3TkUvYFf3SN2CSZNAoBeydDK_JbkV2JKR7dC8fZOm08cZvgMHoQdKSqGlJE-Qf8KxpJSykjJCb9Hn-gjdDFOIX_h9hi5MJ5xaXH1DmoLFb6OfXSo-ILrU442PPsOU8viMV8PQBXs-poinhHexTbm_4ja4s-4O3bTQjf7-fxfo8LI-VNti_7rZVat9AUrSglvPlJFWKGW15yAI1UspnRDGiUYrxqUCZbk2AogRS9NyahvSWMeAApd8gR6v2r-0esihh3yqL4n1JZH_ArKdS7w</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding</title><source>arXiv.org</source><creator>Bahi, Jacques M ; Fang, Xiaole ; Guyeux, Christophe ; Wang, Qianxue</creator><creatorcontrib>Bahi, Jacques M ; Fang, Xiaole ; Guyeux, Christophe ; Wang, Qianxue</creatorcontrib><description>Guaranteeing the security of information transmitted through the Internet,
against passive or active attacks, is a major concern. The discovery of new
pseudo-random number generators with a strong level of security is a field of
research in full expansion, due to the fact that numerous cryptosystems and
data hiding schemes are directly dependent on the quality of these generators.
At the conference Internet`09, we described a generator based on chaotic
iterations which behaves chaotically as defined by Devaney. In this paper which
is an extension of the work presented at the conference Internet`10, the
proposal is to improve the speed, the security, and the evaluation of this
generator, to make its use more relevant in the Internet security context. In
order to do so, a comparative study between various generators is carried out
and statistical results are improved. Finally, an application in the
information hiding framework is presented with details, to give an illustrative
example of the use of such a generator in the Internet security field.</description><identifier>DOI: 10.48550/arxiv.1112.1201</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2011-12</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1112.1201$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1112.1201$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Bahi, Jacques M</creatorcontrib><creatorcontrib>Fang, Xiaole</creatorcontrib><creatorcontrib>Guyeux, Christophe</creatorcontrib><creatorcontrib>Wang, Qianxue</creatorcontrib><title>Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding</title><description>Guaranteeing the security of information transmitted through the Internet,
against passive or active attacks, is a major concern. The discovery of new
pseudo-random number generators with a strong level of security is a field of
research in full expansion, due to the fact that numerous cryptosystems and
data hiding schemes are directly dependent on the quality of these generators.
At the conference Internet`09, we described a generator based on chaotic
iterations which behaves chaotically as defined by Devaney. In this paper which
is an extension of the work presented at the conference Internet`10, the
proposal is to improve the speed, the security, and the evaluation of this
generator, to make its use more relevant in the Internet security context. In
order to do so, a comparative study between various generators is carried out
and statistical results are improved. Finally, an application in the
information hiding framework is presented with details, to give an illustrative
example of the use of such a generator in the Internet security field.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj7tqwzAYRrV0KGn3TkUvYFf3SN2CSZNAoBeydDK_JbkV2JKR7dC8fZOm08cZvgMHoQdKSqGlJE-Qf8KxpJSykjJCb9Hn-gjdDFOIX_h9hi5MJ5xaXH1DmoLFb6OfXSo-ILrU442PPsOU8viMV8PQBXs-poinhHexTbm_4ja4s-4O3bTQjf7-fxfo8LI-VNti_7rZVat9AUrSglvPlJFWKGW15yAI1UspnRDGiUYrxqUCZbk2AogRS9NyahvSWMeAApd8gR6v2r-0esihh3yqL4n1JZH_ArKdS7w</recordid><startdate>20111206</startdate><enddate>20111206</enddate><creator>Bahi, Jacques M</creator><creator>Fang, Xiaole</creator><creator>Guyeux, Christophe</creator><creator>Wang, Qianxue</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20111206</creationdate><title>Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding</title><author>Bahi, Jacques M ; Fang, Xiaole ; Guyeux, Christophe ; Wang, Qianxue</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a651-3ce2695c466c8e3a4018755d449d4b862356a6c3894a09479f31cb0bcd2a1a353</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Bahi, Jacques M</creatorcontrib><creatorcontrib>Fang, Xiaole</creatorcontrib><creatorcontrib>Guyeux, Christophe</creatorcontrib><creatorcontrib>Wang, Qianxue</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bahi, Jacques M</au><au>Fang, Xiaole</au><au>Guyeux, Christophe</au><au>Wang, Qianxue</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding</atitle><date>2011-12-06</date><risdate>2011</risdate><abstract>Guaranteeing the security of information transmitted through the Internet,
against passive or active attacks, is a major concern. The discovery of new
pseudo-random number generators with a strong level of security is a field of
research in full expansion, due to the fact that numerous cryptosystems and
data hiding schemes are directly dependent on the quality of these generators.
At the conference Internet`09, we described a generator based on chaotic
iterations which behaves chaotically as defined by Devaney. In this paper which
is an extension of the work presented at the conference Internet`10, the
proposal is to improve the speed, the security, and the evaluation of this
generator, to make its use more relevant in the Internet security context. In
order to do so, a comparative study between various generators is carried out
and statistical results are improved. Finally, an application in the
information hiding framework is presented with details, to give an illustrative
example of the use of such a generator in the Internet security field.</abstract><doi>10.48550/arxiv.1112.1201</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.1112.1201 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_1112_1201 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security |
title | Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T15%3A06%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Evaluating%20Quality%20of%20Chaotic%20Pseudo-Random%20Generators:%20Application%20to%20Information%20Hiding&rft.au=Bahi,%20Jacques%20M&rft.date=2011-12-06&rft_id=info:doi/10.48550/arxiv.1112.1201&rft_dat=%3Carxiv_GOX%3E1112_1201%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |