Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation
This research work extends the hyperchaotic 4D Chen system into the fractional-order
domain to carry out image encryption over 3 stages. For the first encryption stage, the …
domain to carry out image encryption over 3 stages. For the first encryption stage, the …
Modified chaotic quadratic map with improved robust region
Chaotic systems are now employed in a variety of applications, including nonlinear control,
Pseudo Random Number Generator (PRNG), encryption, and others. However, the majority …
Pseudo Random Number Generator (PRNG), encryption, and others. However, the majority …
Creation of S-box based on a hierarchy of Julia sets: image encryption approach
The newly introduced family of complex chaotic maps has different behavior concerning the
well-known complex chaotic maps. These complex maps have excellent properties such as …
well-known complex chaotic maps. These complex maps have excellent properties such as …
Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security
In the era of big data, protecting digital images from cyberattacks during network
transmission is of utmost importance. While various image encryption algorithms have been …
transmission is of utmost importance. While various image encryption algorithms have been …
Approaches to overpower proof-of-work blockchains despite minority
Blockchain (BC) technology has been established in 2009 by Nakamoto, using the Proof-of-
Work (PoW) to reach consensus in public permissionless networks (Praveen et al., 2020) …
Work (PoW) to reach consensus in public permissionless networks (Praveen et al., 2020) …
A secured LSB-based image steganography using modified collatz conjecture
This research paper presents a novel approach to improving the strength of Least Significant
Bit (LSB) embedding in steganography through the use of the Collatz Conjecture. LSB …
Bit (LSB) embedding in steganography through the use of the Collatz Conjecture. LSB …
Lsb-based random embedding image steganography technique using modified collatz conjecture
With digital communication breakthroughs, reliable data security and secure sharing of
secret information remain a challenge. LSB is considered one of the most used techniques …
secret information remain a challenge. LSB is considered one of the most used techniques …
Novel four dimensional hyperchaotic system: analysis, adaptive control, analog and digital circuit design
In this paper, a new four-dimensional hyperchaotic system (HCS), with quadratic
nonlinearities, has been proposed. The chaotic dynamical behaviors of the proposed system …
nonlinearities, has been proposed. The chaotic dynamical behaviors of the proposed system …
Statistical Analysis of Descending Open Cycles of Collatz Function
Collatz dynamic systems present a statistical space that can be studied rigorously. In a
previous study, the author presented Collatz space in a unique dynamic numerical mode by …
previous study, the author presented Collatz space in a unique dynamic numerical mode by …
Improving Image Security through Data Concealment Methods Added with Arnold Transformation
S Hari, K Pandiaraj - 2024 IEEE Recent Advances in Intelligent …, 2024 - ieeexplore.ieee.org
In spite of advancements in digital communications, the challenge of securing reliable data
protection and safeguarding the exchange of confidential information persists. The least …
protection and safeguarding the exchange of confidential information persists. The least …