A new hybrid digital chaotic system with applications in image encryption

M Alawida, A Samsudin, JS Teh, RS Alkhawaldeh - Signal Processing, 2019 - Elsevier
Image encryption provides confidentiality to images by transforming them into
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …

Cyber security in new space: Analysis of threats, key enabling technologies and challenges

M Manulis, CP Bridges, R Harrison, V Sekar… - International Journal of …, 2021 - Springer
Developments in technologies, attitudes and investment are transforming the space
environment, achieving greater accessibility for an increasing number of parties. New and …

Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

C Li, D Lin, J Lü, F Hao - IEEE multimedia, 2018 - ieeexplore.ieee.org
This paper performs a thorough security analysis of a chaotic image encryption algorithm
based on autoblocking and electrocardiography from the view point of modern cryptography …

A novel pseudorandom number generator based on pseudorandomly enhanced logistic map

MA Murillo-Escobar, C Cruz-Hernández… - Nonlinear …, 2017 - Springer
In last years, low-dimensional and high-dimensional chaotic systems have been
implemented in cryptography. The efficiency and performance of these nonlinear systems …

[HTML][HTML] An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map

P Ramasamy, V Ranganathan, S Kadry… - Entropy, 2019 - mdpi.com
Nowadays, the images are transferred through open channels that are subject to potential
attacks, so the exchange of image data requires additional security in many fields, such as …

A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption

V Patidar, NK Pareek, G Purohit, KK Sud - Optics communications, 2011 - Elsevier
A novel and robust chaos-based pseudorandom permutation–substitution scheme for image
encryption is proposed. It is a loss-less symmetric block cipher and specifically designed for …

Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps

M Essaid, I Akharraz, A Saaidi - Journal of Information Security and …, 2019 - Elsevier
This article suggests a new image encryption algorithm based on a secure variant of Hill
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …

Sine‐Cosine Optimization‐Based Bijective Substitution‐Boxes Construction Using Enhanced Dynamics of Chaotic Map

AA Alzaidi, M Ahmad, HS Ahmed, EA Solami - Complexity, 2018 - Wiley Online Library
This paper proposes a novel method of constructing strong substitution‐boxes (S‐boxes) of
order n (4≤ n≤ 8) based on a recent optimization algorithm known as sine‐cosine …

A robust embedded biometric authentication system based on fingerprint and chaotic encryption

MA Murillo-Escobar, C Cruz-Hernández… - Expert Systems with …, 2015 - Elsevier
Fingerprint recognition is a reliable solution in user authentication systems. Nevertheless,
the security and secrecy of the users data are a concern in today's biometric systems and …

An image encryption algorithm based on substitution technique and chaos mixing

YPK Nkandeu, A Tiedeu - Multimedia Tools and Applications, 2019 - Springer
These recent years, countless chaos-based image encryption algorithms have been
proposed to meet security needs in real time multimedia communication. However, many of …