A review on applications of chaotic maps in pseudo-random number generators and encryption
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
A comprehensive survey on encryption techniques for digital images
With the widespread adoption of smart devices and high-speed networks, investigators are
focusing on securing digital image applications, such as those on social media, in …
focusing on securing digital image applications, such as those on social media, in …
A new hybrid digital chaotic system with applications in image encryption
Image encryption provides confidentiality to images by transforming them into
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …
Color image DNA encryption using NCA map-based CML and one-time keys
In this paper, we introduce a novel color image encryption algorithm based on DNA
sequence operations, one-time keys and the spatiotemporal chaos. Firstly, the key streams …
sequence operations, one-time keys and the spatiotemporal chaos. Firstly, the key streams …
Synchronization of an inertial neural network with time-varying delays and its application to secure communication
In this paper, synchronization of an inertial neural network with time-varying delays is
investigated. Based on the variable transformation method, we transform the second-order …
investigated. Based on the variable transformation method, we transform the second-order …
A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2
In this paper, we propose a novel image encryption algorithm based on a hybrid model of
deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz …
deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz …
A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps
This paper proposes a new encryption scheme for color images based on Deoxyribonucleic
acid (DNA) sequence operations and multiple improved one-dimensional (1D) chaotic …
acid (DNA) sequence operations and multiple improved one-dimensional (1D) chaotic …
Adaptive synchronization of reaction–diffusion neural networks and its application to secure communication
This paper is mainly concerned with the synchronization problem of reaction-diffusion neural
networks (RDNNs) with delays and its direct application in image secure communications …
networks (RDNNs) with delays and its direct application in image secure communications …
An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations
A novel image encryption scheme employing the memristive hyperchaotic system, cellular
automata (CA) and DNA sequence operations is presented, which consists of diffusion …
automata (CA) and DNA sequence operations is presented, which consists of diffusion …
Dynamic analysis, circuit realization, control design and image encryption application of an extended Lü system with coexisting attractors
Q Lai, B Norouzi, F Liu - Chaos, Solitons & Fractals, 2018 - Elsevier
This paper introduces an extended Lü system with coexisting attractors. The number and
stability of equilibria are determined. The coexisting attractors of the system are displayed by …
stability of equilibria are determined. The coexisting attractors of the system are displayed by …