Transport control strategies in named data networking: A survey
Different from traditional IP networks, named data networking (NDN) based on the named
content can realize fast content retrieval and delivery. As one of the most important …
content can realize fast content retrieval and delivery. As one of the most important …
The graph structure of the generalized discrete arnold's cat map
Chaotic dynamics is an important source for generating pseudorandom binary sequences
(PRBS). Much efforts have been devoted to obtaining period distribution of the generalized …
(PRBS). Much efforts have been devoted to obtaining period distribution of the generalized …
Recognizing keystrokes using WiFi devices
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of
human users as what is being typed could be passwords or privacy sensitive information. In …
human users as what is being typed could be passwords or privacy sensitive information. In …
On the security of a class of diffusion mechanisms for image encryption
The need for fast and strong image cryptosystems motivates researchers to develop new
techniques to apply traditional cryptographic primitives in order to exploit the intrinsic …
techniques to apply traditional cryptographic primitives in order to exploit the intrinsic …
Review of chaos detection techniques performed on chaotic maps and systems in image encryption
The security concern in recent times has been rising exponentially, this has lead for highly
secured image transmission. Chaos-based image encryption is increasingly used to protect …
secured image transmission. Chaos-based image encryption is increasingly used to protect …
Embedding cryptographic features in compressive sensing
Compressive sensing (CS) has been widely studied and applied in many fields. Recently,
the way to perform secure compressive sensing (SCS) has become a topic of growing …
the way to perform secure compressive sensing (SCS) has become a topic of growing …
A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform
D Zhang, X Liao, B Yang, Y Zhang - Multimedia Tools and Applications, 2018 - Springer
This paper introduces a novel method of fast and efficient measurement matrices and
random phase masks for color image encryption, in which Kronecker product (KP) is …
random phase masks for color image encryption, in which Kronecker product (KP) is …
Image encryption algorithm based on the finite fields in chaotic maps
A Broumandnia - Journal of Information Security and Applications, 2020 - Elsevier
With the advancement of computer and communication technologies in data processing,
storage, and increasing bandwidth of data transmission, the amount of multimedia data …
storage, and increasing bandwidth of data transmission, the amount of multimedia data …
Behavior based human authentication on touch screen devices using gestures and signatures
With the rich functionalities and enhanced computing capabilities available on mobile
computing devices with touch screens, users not only store sensitive information (such as …
computing devices with touch screens, users not only store sensitive information (such as …
Analysis and resistance of dynamic degradation of digital chaos via functional graphs
C Fan, Q Ding - Nonlinear Dynamics, 2021 - Springer
To analyze the effects of finite computational precision on the dynamical degradation of
digital chaotic maps, we designed a periodic orbit detection algorithm that is based on a …
digital chaotic maps, we designed a periodic orbit detection algorithm that is based on a …