Novel 1-D enhanced Log-logistic chaotic map and asymmetric generalized Gaussian apertured FrFT for image encryption

M Wang, X Song, N Zhou, S Liu - Chaos, Solitons & Fractals, 2024 - Elsevier
This paper proposes a 1-D enhanced Log-logistic chaotic map (1-DELLCM) and an
asymmetric generalized Gaussian apertured fractional Fourier transform (AGGAFrFT). The 1 …

A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks

A Shafique, SAA Naqvi, A Raza, M Ghalaii… - Scientific Reports, 2024 - nature.com
In the era of the Internet of Things (IoT), the transmission of medical reports in the form of
scan images for collaborative diagnosis is vital for any telemedicine network. In this context …

A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling

P Cao, L Teng - Nonlinear Dynamics, 2024 - Springer
This paper introduces a new one-dimensional chaotic system, which can be considered as
an improvement upon the Bernoulli map. The Quadratic Bernoulli Chaotic System (QBCS) is …

An efficient and compromise-resilient image encryption scheme for resource-constrained environments

AN Khan, A Mehmood, MNM Bhutta, IA Khan, AR Khan - Plos one, 2024 - journals.plos.org
The secret keys produced by current image cryptosystems, which rely on chaotic sequences,
exhibit a direct correlation with the size of the image. As the image dimensions expand, the …

[PDF][PDF] Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System.

Z Dong, Z Zhang, H Zhou, X Chen - Computers, Materials & …, 2024 - cdn.techscience.cn
With the advent of the information security era, it is necessary to guarantee the privacy,
accuracy, and dependable transfer of pictures. This study presents a new approach to the …

Integrate encryption of multiple images based on a new hyperchaotic system and Baker map

X Liu - Multimedia Systems, 2024 - Springer
Image encryption serves as a crucial means to safeguard information against unauthorized
access during both transmission and storage phases. This paper introduces an integrated …

An Empirical Performance Comparison Between Linear Regression and Linear Interpolation Algorithms for a Dual-Axes Tracking-Type PV Modules

MC Lehloka - 2024 5th International Conference on Artificial …, 2024 - ieeexplore.ieee.org
The need for renewable resource growth stems from the world's ever-growing energy
consumption rate, finite supply of fossil fuels, and pollution. In order to accomplish the 2030 …

Financial Time Series Forecasting Using a Wavelet Denoised LSTM With Attention Mechanism: A Design Science Research Study

SL Kirby - 2024 - search.proquest.com
Data scientists have built advanced algorithms using neural network models to gather
insights from big data. As a result, many novel deep-learning networks are being introduced …