A search for good pseudo-random number generators: Survey and empirical studies
This paper targets to search so-called good generators by doing a brief survey over the
generators developed in the history of pseudo-random number generators (PRNGs), verify …
generators developed in the history of pseudo-random number generators (PRNGs), verify …
[HTML][HTML] Chaos game representation and its applications in bioinformatics
Chaos game representation (CGR), a milestone in graphical bioinformatics, has become a
powerful tool regarding alignment-free sequence comparison and feature encoding for …
powerful tool regarding alignment-free sequence comparison and feature encoding for …
DCT & DWT based watermarking scheme for medical information security
In order to secure the exchanged medical images in telemedicine, we propose in this work
two blind watermarking approaches for the medical images protection. In the first scheme a …
two blind watermarking approaches for the medical images protection. In the first scheme a …
An image encryption algorithm based on new generalized fusion fractal structure
The design and utilization of suitable fractal structures is one of the prominent areas of
security for the protection of digital data. This paper proposes a generalized fusion fractal …
security for the protection of digital data. This paper proposes a generalized fusion fractal …
A new image encryption based on bit replacing, chaos and DNA coding techniques
Millions of confidential images are transmitted every day by people through the multimedia
systems of the internet. Such confidential information in the images may be belong to the …
systems of the internet. Such confidential information in the images may be belong to the …
A DWT based watermarking approach for medical image protection
In order to contribute to the security of medical image, we present in this paper a blind and
robust watermarking technique that allows the integration of the electronic patient's record …
robust watermarking technique that allows the integration of the electronic patient's record …
A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications
Watermarking is one of the techniques used to protect multimedia data, and images in
particular, from malicious attacks by inserting a signature into these images. However …
particular, from malicious attacks by inserting a signature into these images. However …
A Fourier transform based audio watermarking algorithm
In this paper; we propose two new substitution schemes for digital audio watermarking
based on the Fourier transform. The integration of the watermark will be performed by …
based on the Fourier transform. The integration of the watermark will be performed by …
Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
A new chaotic complex map for robust video watermarking
In this paper, using a new two-dimensional complex map, a secure video watermarking
system is presented. Standard analyzes have been performed to analyze a dynamical …
system is presented. Standard analyzes have been performed to analyze a dynamical …