Rhouma Rhouma

Learn More
This paper reports a detailed cryptanalysis of a recently proposed encryption scheme based on the logistic map [A. Pisarchik et al., Chaos 16, 033118 (2006)]. Some problems are emphasized concerning the key space definition and the implementation of the cryptosystem using floating-point operations. It is also shown how it is possible to reduce considerably(More)
Science and Numerical Simulations in February 2009. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Abstract In this comment, we analyze a(More)
In this paper, we propose to cryptanalyse an encryption algorithm which combines a DNA addition and a chaotic map to encrypt a gray scale image. Our contribution consists on, at first, demonstrating that the algorithm, as it is described, is non-invertible, which means that the receiver cannot decrypt the ciphered image even if he posses the secret key.(More)
In this paper, we propose to enhance a recently proposed image cryptosystem based on hyper-chaos. The updated version has been builded to resist against attacks made to break the original one and to make it faster. The modification touch on the two Boxes, P-Box and S-Box, which composed the original cryptosystem. Compared with classical encryption scheme,(More)
The paper proposes breaks for the permutation methods adopted in the chaos-based image cryptosystems. By a careful examination on the most chaotic image cryptosystems we can find that the permutation process constitute the main step or, in some cases, the only step to create the confusion. It can be applied on the pixels or on the pixel bits. A recently(More)
Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Abstract This paper studies the security of a recently proposed chaos-based cryptosystem.(More)
In this paper a piecewise linear chaotic map (PWLCM) is used to build a new digital chaotic cryptosystem. The characteristics of PWLCM are very suitable for the design of encryption schemes. The implicit digital degradation problem of PWLCM has been eluded through the discretization of the phase space. The accuracy, efficiency and security of the proposed(More)
We propose to incorporate encryption procedure into the lossy compression of voice data PCM(Pulse Code Modulation) based on the A-law approximation quantization. The proposed codec CPCM (Chaotic Pulse Code Modulaion) will join the encryption to the compression of the voice data. This scheme provides the same compression ratio given by the PCM codec, but(More)
This paper presents a new secure variant of ADPCM encoders that are adopted by the CCITT as Adaptive Differential Pulse Code Modulation. This version provides encryption and decryption of voice simultaneously with operations ADPCM encoding and decoding. The evaluation of the scheme showed better performance in terms of speed and security.
  • Anil Kumar, Rhouma Rhouma, Yong Wang, Nicolas Sklavos, M K Ghose
  • 2010
In this paper we have found that proposed cryptosystem a blind source separation for multiple images encryption suffers from the same weakness as of the previous BSS-based crypto-systems proposed by Lin et al. Hence, it is also vulnerable to various types attacks. Multimedia security is most important these days due to the widespread transmission over(More)