Chaos-based image encryption: Review, application, and challenges
B Zhang, L Liu - Mathematics, 2023 - mdpi.com
Chaos has been one of the most effective cryptographic sources since it was first used in
image-encryption algorithms. This paper closely examines the development process of …
image-encryption algorithms. This paper closely examines the development process of …
Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption
The main concern of this paper is to address the synchronization problem of chaotic
fractional-order fuzzy cellular neural networks (FOFCNNs) through designing the novel …
fractional-order fuzzy cellular neural networks (FOFCNNs) through designing the novel …
Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application
In this paper, a digital image encryption algorithm is proposed based on the generalized
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation
Present paper introduces a polynomial combination of one dimensional chaotic maps that is
blended in a dynamic image encryption algorithm. It is special because not only this …
blended in a dynamic image encryption algorithm. It is special because not only this …
Bifurcation, chaos and fixed-time synchronization of memristor cellular neural networks
Q Chen, B Li, W Yin, X Jiang, X Chen - Chaos, Solitons & Fractals, 2023 - Elsevier
This study investigates a novel chaotic memristive cellular neural network (CNN) and its
synchronization. Firstly, a fourth-order chaotic system with a memristor is established by …
synchronization. Firstly, a fourth-order chaotic system with a memristor is established by …
A comprehensive review about image encryption methods
In today's technology world, data security has a great importance. Because each data type
has its own characteristics, there are various methods of providing this security. The main …
has its own characteristics, there are various methods of providing this security. The main …
A new image encryption algorithm based on single S-box and dynamic encryption step
WJ Jun, TS Fun - IEEE Access, 2021 - ieeexplore.ieee.org
Chaotic-based S-box image encryption schemes promise to be a practical solution for
securing digital images. However, the high-dimensional continuous chaotic has increased …
securing digital images. However, the high-dimensional continuous chaotic has increased …
Dynamic stability analysis of stochastic fractional-order memristor fuzzy BAM neural networks with delay and leakage terms
This paper deals with the uniform stability in mean square of stochastic fractional-order
memristor fuzzy BAM neural networks with delay and leakage terms. By employing the ideas …
memristor fuzzy BAM neural networks with delay and leakage terms. By employing the ideas …
Multi-images encryption scheme based on 3D chaotic map and substitution box
The protection of digital content is increasingly becoming a significant issue for researchers
and engineers. In this context, nonlinear dynamic systems play a vital role in information …
and engineers. In this context, nonlinear dynamic systems play a vital role in information …
New results on pseudo almost periodic solutions of quaternion-valued fuzzy cellular neural networks with delays
C Xu, M Liao, P Li, Z Liu, S Yuan - Fuzzy Sets and Systems, 2021 - Elsevier
This article investigates quaternion-valued fuzzy cellular neural networks with delays. With
the help of fixed point theory, exponential dichotomy of linear equations and related …
the help of fixed point theory, exponential dichotomy of linear equations and related …