An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map
Nowadays, the images are transferred through open channels that are subject to potential
attacks, so the exchange of image data requires additional security in many fields, such as …
attacks, so the exchange of image data requires additional security in many fields, such as …
Image encryption algorithm based on logistic and two-dimensional lorenz
T Li, B Du, X Liang - Ieee Access, 2020 - ieeexplore.ieee.org
In recent years, experts and scholars in the field of information security have attached great
importance to the security of image information. They have proposed many image …
importance to the security of image information. They have proposed many image …
An image encryption approach based on chaotic maps and genetic operations
Y Niu, Z Zhou, X Zhang - Multimedia Tools and Applications, 2020 - Springer
This paper puts forward an image encryption approach using chaotic maps and genetic
operations. First, the Keccak algorithm is employed to compute the hash values of a plain …
operations. First, the Keccak algorithm is employed to compute the hash values of a plain …
[HTML][HTML] A new cryptographic algorithm via a two-dimensional chaotic map
In this paper, a new cryptographic algorithm using a two-dimensional piecewise smooth
nonlinear chaotic map is suggested. It depends on the confusion-diffusion model …
nonlinear chaotic map is suggested. It depends on the confusion-diffusion model …
Parallel strength Pareto evolutionary algorithm‐II based image encryption
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …
Ring oscillator as confusion–diffusion agent: a complete TRNG drove image security
The utility of true random number generators (TRNGs) is not only restricted to session key
generation, nonce generation, OTP generation etc. in cryptography. In the proposed work …
generation, nonce generation, OTP generation etc. in cryptography. In the proposed work …
An algorithm of image encryption using logistic and two-dimensional chaotic economic maps
In the literature, there are many image encryption algorithms that have been constructed
based on different chaotic maps. However, those algorithms do well in the cryptographic …
based on different chaotic maps. However, those algorithms do well in the cryptographic …
Image encryption scheme with compressed sensing based on new three-dimensional chaotic system
Y **e, J Yu, S Guo, Q Ding, E Wang - Entropy, 2019 - mdpi.com
In this paper, a new three-dimensional chaotic system is proposed for image encryption. The
core of the encryption algorithm is the combination of chaotic system and compressed …
core of the encryption algorithm is the combination of chaotic system and compressed …
Chua's diode and strange attractor: a three‐layer hardware–software co‐design for medical image confidentiality
S Rajagopalan, S Poori, M Narasimhan… - IET Image …, 2020 - Wiley Online Library
Medical image security relies upon the arrival of improved techniques for enhancing the
confusion as well as diffusion processes in the pixel level manipulations. Non‐linear circuits …
confusion as well as diffusion processes in the pixel level manipulations. Non‐linear circuits …
Quantum-resistant cryptography for the internet of things based on location-based lattices
OS Althobaiti, M Dohler - IEEE Access, 2021 - ieeexplore.ieee.org
An important enabler of the Internet of Things (IoT) is the Narrow-Band Internet of Things
(NB-IoT) technology, which is a 3GPP standards compliant connectivity solution. Quantum …
(NB-IoT) technology, which is a 3GPP standards compliant connectivity solution. Quantum …