Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation

W Alexan, D El-Damak, M Gabr - IEEE Access, 2024 - ieeexplore.ieee.org
This research work extends the hyperchaotic 4D Chen system into the fractional-order
domain to carry out image encryption over 3 stages. For the first encryption stage, the …

Modified chaotic quadratic map with improved robust region

T Umar, M Nadeem, F Anwer - International Journal of Information …, 2024 - Springer
Chaotic systems are now employed in a variety of applications, including nonlinear control,
Pseudo Random Number Generator (PRNG), encryption, and others. However, the majority …

Creation of S-box based on a hierarchy of Julia sets: image encryption approach

RH Sani, S Behnia, A Akhshani - Multidimensional Systems and Signal …, 2022 - Springer
The newly introduced family of complex chaotic maps has different behavior concerning the
well-known complex chaotic maps. These complex maps have excellent properties such as …

Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security

MU Rehman, A Shafique, KH Khan, SN Altamimi… - IEEE …, 2023 - ieeexplore.ieee.org
In the era of big data, protecting digital images from cyberattacks during network
transmission is of utmost importance. While various image encryption algorithms have been …

Approaches to overpower proof-of-work blockchains despite minority

H Baniata, A Kertesz - IEEE Access, 2023 - ieeexplore.ieee.org
Blockchain (BC) technology has been established in 2009 by Nakamoto, using the Proof-of-
Work (PoW) to reach consensus in public permissionless networks (Praveen et al., 2020) …

A secured LSB-based image steganography using modified collatz conjecture

AD Molato, FB Calanda - 2023 9th International Conference on …, 2023 - ieeexplore.ieee.org
This research paper presents a novel approach to improving the strength of Least Significant
Bit (LSB) embedding in steganography through the use of the Collatz Conjecture. LSB …

Lsb-based random embedding image steganography technique using modified collatz conjecture

AD Molato, FB Calanda, AM Sison… - 2022 7th International …, 2022 - ieeexplore.ieee.org
With digital communication breakthroughs, reliable data security and secure sharing of
secret information remain a challenge. LSB is considered one of the most used techniques …

Novel four dimensional hyperchaotic system: analysis, adaptive control, analog and digital circuit design

K Suneja, N Pandey, R Pandey - International Journal of Information …, 2024 - Springer
In this paper, a new four-dimensional hyperchaotic system (HCS), with quadratic
nonlinearities, has been proposed. The chaotic dynamical behaviors of the proposed system …

Statistical Analysis of Descending Open Cycles of Collatz Function

K Barghout, W Hajji, N Abu-Libdeh, M Al-Jamal - Mathematics, 2023 - mdpi.com
Collatz dynamic systems present a statistical space that can be studied rigorously. In a
previous study, the author presented Collatz space in a unique dynamic numerical mode by …

Improving Image Security through Data Concealment Methods Added with Arnold Transformation

S Hari, K Pandiaraj - 2024 IEEE Recent Advances in Intelligent …, 2024 - ieeexplore.ieee.org
In spite of advancements in digital communications, the challenge of securing reliable data
protection and safeguarding the exchange of confidential information persists. The least …