Secure and energy efficient-based E-health care framework for green internet of things
This paper proposes a secure and energy-efficient Internet of Things (IoT) model for e-
health. The main objective is to secure the transmission and retrieval of biomedical images …
health. The main objective is to secure the transmission and retrieval of biomedical images …
Image encryption using 2D Logistic-adjusted-Sine map
With complex properties of ergodicity, unpredictability and sensitivity to initial states, chaotic
systems are widely used in cryptography. This paper proposes a two-dimensional Logistic …
systems are widely used in cryptography. This paper proposes a two-dimensional Logistic …
2D Sine Logistic modulation map for image encryption
Because of the excellent properties of unpredictability, ergodicity and sensitivity to their
parameters and initial values, chaotic maps are widely used in security applications. In this …
parameters and initial values, chaotic maps are widely used in security applications. In this …
A fast image encryption algorithm based on chaotic map
W Liu, K Sun, C Zhu - Optics and Lasers in Engineering, 2016 - Elsevier
Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-
dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop …
dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop …
A new fractional one dimensional chaotic map and its application in high-speed image encryption
MZ Talhaoui, X Wang - Information Sciences, 2021 - Elsevier
Chaos theory has been widely used in the design of image encryption schemes. Some low-
dimensional chaotic maps have been proved to be easily predictable because of their small …
dimensional chaotic maps have been proved to be easily predictable because of their small …
A novel image encryption scheme using both pixel level and bit level permutation with chaotic map
In cryptography, chaotic cryptosystem is one of the methods to carry out encryption and
decryption of images. This paper introduces a new symmetric key encryption technique …
decryption of images. This paper introduces a new symmetric key encryption technique …
A sensitive dynamic mutual encryption system based on a new 1D chaotic map
In this research paper, we propose a novel one-dimensional chaotic system based on the
fraction of cosine over sine (1-DFCS). Evaluation of 1-DFCS indicates the existence of a …
fraction of cosine over sine (1-DFCS). Evaluation of 1-DFCS indicates the existence of a …
Design of image cipher using block-based scrambling and image filtering
The operation of image filtering is widely used to deblur digital images. However, using
inappropriate masks, it can also blur images. Motivated by this concept, this paper …
inappropriate masks, it can also blur images. Motivated by this concept, this paper …
An image encryption algorithm based on bit level Brownian motion and new chaotic systems
X Chai - Multimedia Tools and Applications, 2017 - Springer
In this paper, a new image encryption algorithm based on Brownian motion and new 1D
chaotic system is introduced. Firstly, SHA 256 hash value of the plain image is used to …
chaotic system is introduced. Firstly, SHA 256 hash value of the plain image is used to …
A new one-dimensional cosine polynomial chaotic map and its use in image encryption
In this paper, we propose a new real one-dimensional cosine polynomial (1-DCP) chaotic
map. The statistical analysis of the proposed map shows that it has a simple structure, a high …
map. The statistical analysis of the proposed map shows that it has a simple structure, a high …