0% found this document useful (0 votes)
4 views5 pages

Classical Cryptography Is The Foundation of Modern Security

This document presents a research defense on the implementation and development of advanced algorithms for data security, particularly focusing on image encryption using biometric-based systems. It discusses the challenges of securing sensitive data, traditional encryption limitations, and introduces an Improved Composite Chaotic Map (ICCM) for enhanced encryption resilience. The findings demonstrate the effectiveness of the proposed methods in ensuring data integrity and security against modern cryptographic attacks.

Uploaded by

Nabil Boucemina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views5 pages

Classical Cryptography Is The Foundation of Modern Security

This document presents a research defense on the implementation and development of advanced algorithms for data security, particularly focusing on image encryption using biometric-based systems. It discusses the challenges of securing sensitive data, traditional encryption limitations, and introduces an Improved Composite Chaotic Map (ICCM) for enhanced encryption resilience. The findings demonstrate the effectiveness of the proposed methods in ensuring data integrity and security against modern cryptographic attacks.

Uploaded by

Nabil Boucemina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1

Slide 1: Introduction to Information Security

Bissmi allah erahmani erahim


Assalam alaikum evry one
Esteemed members of examination committee, dear parents , dear assistence it’s with proufound
gratitude I welcome you to this accadimic jurney thank you for your presence. In this significant
occasion I will introduce my research defense entitled : implimentation and development of
advanced algorithms dedicated to security and identification by the supervisory of profs ziet
lehcen and bekkouche tawfik so

Slide 2: overview

In this presentation I will first introduce my work presenting the challenges in securing data
specialy images . followed by the basic of classical security systems and their limitations with
complex and sensitive data like high resolutions image and biometric templates, wich studied
and solved in my key contributions including the the integration of biometric based encryption
for retinal images than the improved composite chaotic map for images encryption sheme and
their results. to finished with conclusion and proposed future works.

Slide 3: Problem statement


I will start by asking the most important questions that this reaserch have been ensewered it later:
what is security system, why we need these systems in our modern digital life?, how we can
build it to be robust and efficiency

Slide 4: what?
Security system is a protocol or thechnique designed to protect sensitive data, ensuring
confidentiality, integrity, availability, and authentication. It is essential in various sectors,
including communication, identification, healthcare, and cloud data management.

Slide 5: why?
With the rise in cyberattacks like phishing, ransomware, and identity theft, sensitive biometric
and medical data are increasingly at risk. Traditional encryption methods face challenges in
efficiently securing this data, and emerging threats like AI and quantum computing require new,
more robust encryption systems
Slide 6: how ?
To build a robust and scalable encryption system, we need to combine two powerful
components: chaotic systems and biometric key generation. These elements enhance key
sensitivity and provide greater unpredictability, ensuring better resilience against cryptographic
attacks

Slide 7: objectives
The main objectives of this research include:
Generating biometric-based encryption keys for secure image encryption.
Developing the Improved Composite Chaotic Map (ICCM).
2

Integrating optical transforms such as FrFT and DRPE with chaotic systems.
to enhance key sensitivity and resilience against modern attacks.
Thefore Preserve data integrity post-decryption

Slide 8: Preliminaries on Image Security Systems


Before diving into the core contributions, let’s explore the basics of image security
systems. This includes biometric security systems that verify identity using unique
physical traits such as fingerprints or retinal scans, and the role of cryptographic
systems in protecting sensitive information.

Slide 9: Classical cryptographic systems


Classical cryptographic systems Include methods like symmetric encryption (e.g.,
AES), asymmetric encryption (e.g., RSA), the hybrid encryption systems and hashing
encryption . These methods have been foundational in information security, but they
face limitations when applied to nowdays securty systen such as biometric data and
high-resolution images.

Slide 10: Challenges with Image Encryption


Encrypting images introduces specific challenges, including redundancy and high
dimensionality. Traditional systems like AES struggle with large image data, failing
to account for pixel correlations and image patterns, which remain visible in
encrypted images.
Slide 11: Chaos-Based Cryptography
Chaos-based cryptography leverages the unpredictable nature of chaotic systems. These systems
exhibit sensitive dependence on initial conditions, making them ideal for generating
unpredictable encryption keys and enhancing the security of sensitive data like biometric images.
Slide 12: Chaos-Based Cryptography
Chaotic Maps for Encryption : Common chaotic maps used in cryptography include the logistic
tent, Henon map, , and Lorenz system.These maps generate highly sensitive outputs, making
them ideal for encryption systems that need high unpredictability and resilience to attacks

Slide 13: Encryption Techniques (DRPE/FrFT)


Fractional Fourier Transform (FrFT) and Double Random Phase Encoding (DRPE) are optical
encryption techniques used to further enhance image security. These techniques add multi-
domain scrambling, making it harder for attackers to decrypt the data.

Slide 14: Nonlinear Functions for Image Processing


Nonlinear functions are key in enhancing encryption security. Functions like Sigmoid,
Hyperbolic Tangent, and Piecewise Linear Chaotic Maps (PWLCM) ensure that small changes
in the input cause large, unpredictable changes in the output, adding complexity to the
encryption.
Slide 15: Biometric Key Generation
3

Biometric key generation plays a pivotal role in this work. By using features extracted from
biometric data, we generate encryption keys that are unique to the individual. This approach
ensures strong identity binding, making it harder for unauthorized users to break the encryption.

Slide 16: introduction


Where We are about creating ……..
**The proposed study was in the process of enhancing …..
1**therfore Non-linear Chaotic functions introduce a higher level of conplexity and confusion
….
2Sensitivity
3So in strengthan the data security

Slide 17: proposed algorthm


This pocess applied to facilitate treatment of image retina .
The seconds phase of the schem present the advanced algorithm where the segmented image
was the input data of the hyperbolic tengent with two chaos generated by the logistic map than
we introduce the biometric finger print template and an other chaos as keis of the permutation
diffusion architecture the obtained image called encrypted image can be recover by aplyn the
inverse of each step
Slide 18: obtined results
•This result was obtained by the running of matlab 2016 version in personal laptop both
encryption/decryption and tests codes so,
•We took five samples randomly from ….
•Than by ……. Forme of wight noise .The figure bellow illustrate result obtined.

Slide 19: wrong finger print


In ordre to verifite the effectivenesse of our proposed algorithm, the decryption operation is done
, the figure a rpresent ……. Will figure b
Slide 20: sensitivity + keyspace

1 To conduct the sensitivity analysis, we introduce slight variations in one element of the
encryption key while keeping the others constant.
2 Based on the sensitivity analysis results obtained ..
Notably, this value surpasses the encryption requirement of
which confirmed the robustness of the encryption system against potential attacks.
Slide 21: evaluation metrics

This subsection evaluates the proposed algorithm using key metrics: correlation rate, PSNR, and
MSE. Table 1 presented provides a summary of all the results obtained. The comparison between
the proposed method and the method referenced in [120] in terms of CORR, PSNR, and MSE
metrics across 5 retinal images offers insights into the effectiveness of the proposed Chaotic
Retinal Image Encryption Pre-processing Based on Biometric Key.

Slide 22: Conclusion of Retinal Cryptosystem


4

In conclusion, the retinal cryptosystem we developed offers a secure and efficient


method for encrypting sensitive medical data. It is highly resistant to cryptographic
attacks, ensuring patient privacy and the confidentiality of medical images.
Slide 23: Improved Chaos for Image Encryption
Our second contribution introduces the Improved Composite Chaotic Map (ICCM), which
enhances key sensitivity and resilience against modern cryptanalytic attacks, offering a robust
solution for encrypting biometric images and medical data
Slide 24: Key Contributions vs Existing Schemes
When compared to existing encryption schemes, our ICCM-based system offers expanded
chaotic ranges, higher key sensitivity, and resistance to statistical attacks, setting it apart as a
more secure and efficient approach.
Slide 25: ICCM Chaotic Behavior Evaluation
1- Mathematicaly the ICCM is the composite of quadratic and cubic chaotic maps ,
2- We evaluate the chaotic behavior of this improved map through bifurcation diagrams,
Lyapunov exponents, and Kolmogorov entropy,

3- The bifurcation diagram highlights regions of high density, while showing an absence
of shallow areas and indicating chaotic behaviour across the entire interval. This confirms
the map's suitability for secure cryptographic applications, outperforming classical
methods.
4- A system is considered chaotic if it exhibits at least one positive Lyapunov Exponent
(LE). This exponent quantifies the average rate of divergence or convergence of nearby
trajectories in the system
5- A higher Kolmogorov entropy value signifies increased unpredictability, meaning that
even slight variations in the initial state lead to exponensially divergening trajectories.
6- Figure bellow presente the Kolmogorov entropy visualizations illustrating the
increased entropy and complexity of ICCM in comparison to conventional chaotic
functions
7- demonstrating that ICCM provides a full-range chaotic behavior with enhanced
instability .

Slide 28: Randomness Test Results


To further validate the randomness of our encryption scheme , we applied NIST tests. The results
in the table show that our ICCM-based encryption produces highly random output, while pass all
the nist test .
Slide 29: The ICCM Encryption Scheme
The ICCM-based encryption scheme applies multi-domain scrambling for enhanced security. We
test the system with images of different sizes and types, demonstrating its effectiveness in
producing secure and efficient encrypted images."
Slide 30: Performance Metrics
Using metrics like corr PSNR, and MSE, we evaluate the performance of the ICCM-based
system while the ideal value of correlation is zero, psnr < 10 and MSE > 10^4 the tables results
show its superior performance compared to existing encryption methods.

Slide 31: Histogram Analysis Results


5

Also the Histogram analysis confirms that the ICCM-based encryption produces uniformly
distributed encrypted images, preventing pattern leakage and ensuring a high level of security.
Slide 32: Loss Data Test Results
The loss data tests show that even with up to 50% loss in the encrypted image, the decrypted
image retains enough quality to ensure secure communication, further proving the system’s
robustness
Slide 33: Sensitivity Analysis Results
Sensitivity tests confirm that small changes in the initial chaotic parameters lead to significant
differences in the decrypted image, demonstrating the high sensitivity and chaotic nature of
ICCM based encryption system.

Slide 34: key space test


A large key space is one of our key contributions. This test represents the obtained result in the
context of keyspace compared to the literature method, a high key space value indicates the
complexity and the robustness of the proposed system

Slide 36: efficiency test results


In this test we are about evaluating npcr and uaci percentage of different images types and sizes
the table ullistrate that our algorithm is efficient.

Slide 37: : efficiency test results

Time process is so importante in developing security systems. In this test we presente the time
encryption of images with different size compared by the referenced method our scheme take
less time in the encryption phase .

You might also like