Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs
Image encryption is increasingly becoming an important area of research in information
security and network communications as digital images are widely used in various …
security and network communications as digital images are widely used in various …
Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption
With the explosion of the generation, transmission and sharing of image data over the
Internet and other unsecured networks, the need for and significance of the development of …
Internet and other unsecured networks, the need for and significance of the development of …
R3—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
This work proposes a novel image encryption algorithm that integrates unique image
transformation techniques with the principles of chaotic and hyper-chaotic systems. By …
transformation techniques with the principles of chaotic and hyper-chaotic systems. By …
Image Encryption via Base-n PRNGs and Parallel Base-n S-Boxes
The fast-paced advancement in multimedia production and exchanges over unsecured
networks have led to a dire need to develop security applications. In this regard, chaos …
networks have led to a dire need to develop security applications. In this regard, chaos …
Color image cryptosystem based on sine chaotic map, 4d chen hyperchaotic map of fractional-order and hybrid dna coding
With advancements in computer and communication technologies, the production, utilization
and applications of digital images is at an unprecedented rate. Recent applications include …
and applications of digital images is at an unprecedented rate. Recent applications include …
Anteater: When arnold's cat meets langton's ant to encrypt images
With the proliferation of digital images over open networks, secure and efficient encryption
schemes are imperative for safeguarding image privacy. This paper proposes a novel 5 …
schemes are imperative for safeguarding image privacy. This paper proposes a novel 5 …
Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response
In this study, the methodology of cyber-resilience in small and medium-sized organizations
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …
Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation
This research work extends the hyperchaotic 4D Chen system into the fractional-order
domain to carry out image encryption over 3 stages. For the first encryption stage, the …
domain to carry out image encryption over 3 stages. For the first encryption stage, the …
Lightweight image encryption algorithm using NLFSR and CBC mode
The digital images are widely captured, transmitted, and stored by limited resource devices.
Those devices need lightweight encryption (LWE) techniques to protect secret and personal …
Those devices need lightweight encryption (LWE) techniques to protect secret and personal …
Cellular automata, s-box and dna coding based spn for image encryption
The rapidly increasing transmission of multimedia through the Internet and insecure
communication channels is challenging scientists and engineers to develop efficient security …
communication channels is challenging scientists and engineers to develop efficient security …