A new image encryption based on bit replacing, chaos and DNA coding techniques
Millions of confidential images are transmitted every day by people through the multimedia
systems of the internet. Such confidential information in the images may be belong to the …
systems of the internet. Such confidential information in the images may be belong to the …
Selective image encryption method based on dynamic DNA coding and new chaotic map
Q Cun, X Tong, Z Wang, M Zhang - Optik, 2021 - Elsevier
In order to improve the various security indicators and encryption and decryption speeds of
dynamic DNA coding in the field of image encryption, a selective image encryption method …
dynamic DNA coding in the field of image encryption, a selective image encryption method …
Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption
PN Andono - Ieee Access, 2022 - ieeexplore.ieee.org
Confusion and diffusion are two main concepts in cryptography that affect the quality of
encryption and resistance to various attacks. Both of these concepts are influenced by the …
encryption and resistance to various attacks. Both of these concepts are influenced by the …
A novel data encryption method using an interlaced chaotic transform
We present a novel data encryption approach that utilizes a cascaded chaotic map
application. The chaotic map used in both permutation and diffusion is Arnold's Cat Map …
application. The chaotic map used in both permutation and diffusion is Arnold's Cat Map …
A GRU and chaos-based novel image encryption approach for transport images
Abstract An Intelligent Transport System (ITS) uses smart devices to capture the traffic data
in the form of images. However, the adversary can steal and misuse this traffic information …
in the form of images. However, the adversary can steal and misuse this traffic information …
Towards accurate keyspace analysis of chaos-based image ciphers
In recent years, there has been a surge in new chaos-based cryptographic algorithms, many
of which claim to have unusually large keyspaces. Although cryptographic primitives such as …
of which claim to have unusually large keyspaces. Although cryptographic primitives such as …
Adaptive image encryption based on twin chaotic maps
The information stored or shared via the internet is growing massively and includes images
primarily. The images are vulnerable to attacks when transferred over the internet as they …
primarily. The images are vulnerable to attacks when transferred over the internet as they …
Chaotic map optimization for image encryption using triple objective differential evolution algorithm
Chaotic maps used to shuffle and manipulate the image pixels are important for image
encryption (IE). In this study, a novel 2D optimized chaotic map (OPMAP) using a triple …
encryption (IE). In this study, a novel 2D optimized chaotic map (OPMAP) using a triple …
A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks
Within the domain of image encryption, an intrinsic trade-off emerges between
computational complexity and the integrity of data transmission security. Protecting digital …
computational complexity and the integrity of data transmission security. Protecting digital …
A new image encryption scheme based on the hybridization of lorenz chaotic map and fibonacci q-matrix
In various image-processing applications, the fractional-order functions outperform their
equivalent integer-order functions. In this study, we proposed a novel technique to encrypt …
equivalent integer-order functions. In this study, we proposed a novel technique to encrypt …