A search for good pseudo-random number generators: Survey and empirical studies

K Bhattacharjee, S Das - Computer Science Review, 2022 - Elsevier
This paper targets to search so-called good generators by doing a brief survey over the
generators developed in the history of pseudo-random number generators (PRNGs), verify …

[HTML][HTML] Chaos game representation and its applications in bioinformatics

HF Löchel, D Heider - Computational and structural biotechnology journal, 2021 - Elsevier
Chaos game representation (CGR), a milestone in graphical bioinformatics, has become a
powerful tool regarding alignment-free sequence comparison and feature encoding for …

DCT & DWT based watermarking scheme for medical information security

K Fares, A Khaldi, K Redouane, E Salah - Biomedical Signal Processing …, 2021 - Elsevier
In order to secure the exchanged medical images in telemedicine, we propose in this work
two blind watermarking approaches for the medical images protection. In the first scheme a …

An image encryption algorithm based on new generalized fusion fractal structure

M Ahmad, S Agarwal, A Alkhayyat, A Alhudhaif… - Information …, 2022 - Elsevier
The design and utilization of suitable fractal structures is one of the prominent areas of
security for the protection of digital data. This paper proposes a generalized fusion fractal …

A new image encryption based on bit replacing, chaos and DNA coding techniques

SF Yousif, AJ Abboud, RS Alhumaima - Multimedia Tools and Applications, 2022 - Springer
Millions of confidential images are transmitted every day by people through the multimedia
systems of the internet. Such confidential information in the images may be belong to the …

A DWT based watermarking approach for medical image protection

F Kahlessenane, A Khaldi, R Kafi, S Euschi - Journal of Ambient …, 2021 - Springer
In order to contribute to the security of medical image, we present in this paper a blind and
robust watermarking technique that allows the integration of the electronic patient's record …

A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications

MS Moad, MR Kafi, A Khaldi - Microprocessors and Microsystems, 2022 - Elsevier
Watermarking is one of the techniques used to protect multimedia data, and images in
particular, from malicious attacks by inserting a signature into these images. However …

A Fourier transform based audio watermarking algorithm

E Salah, K Amine, K Redouane, K Fares - Applied Acoustics, 2021 - Elsevier
In this paper; we propose two new substitution schemes for digital audio watermarking
based on the Fourier transform. The integration of the watermark will be performed by …

Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

P Ayubi, S Setayeshi, AM Rahmani - Chaos, Solitons & Fractals, 2023 - Elsevier
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …

A new chaotic complex map for robust video watermarking

P Ayubi, M Jafari Barani, M Yousefi Valandar… - Artificial Intelligence …, 2021 - Springer
In this paper, using a new two-dimensional complex map, a secure video watermarking
system is presented. Standard analyzes have been performed to analyze a dynamical …