Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs

W Alexan, N Alexan, M Gabr - Fractal and Fractional, 2023 - mdpi.com
Image encryption is increasingly becoming an important area of research in information
security and network communications as digital images are widely used in various …

Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption

W Alexan, YL Chen, LY Por, M Gabr - Symmetry, 2023 - mdpi.com
With the explosion of the generation, transmission and sharing of image data over the
Internet and other unsecured networks, the need for and significance of the development of …

Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem

M Gabr, H Younis, M Ibrahim, S Alajmy, I Khalid… - Symmetry, 2022 - mdpi.com
The need for information security has become urgent due to the constantly changing nature
of the Internet and wireless communications, as well as the daily generation of enormous …

Multi-stage rgb image encryption

M Gabr, W Alexan, K Moussa, B Maged… - 2022 International …, 2022 - ieeexplore.ieee.org
The demand for efficient picture encryption techniques is growing all the time. Meanwhile,
recent research has demonstrated that using chaotic functions and PRNG to administrate …

Efficient dynamic S-box generation using linear trigonometric transformation for security applications

AH Zahid, M Ahmad, A Alkhayyat, MT Hassan… - IEEE …, 2021 - ieeexplore.ieee.org
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …

A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm

F Artuğer - Wireless Personal Communications, 2023 - Springer
Encryption provides security in cases such as storing confidential information or transmitting
it over a network. Today, block cipher algorithms are generally used for encryption …

A cryptographic scheme for construction of substitution boxes using quantic fractional transformation

A Mahboob, M Asif, M Nadeem, A Saleem… - IEEE …, 2022 - ieeexplore.ieee.org
In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise
confusion in cipher text and the security of encryption directly depends on the algebraic …

[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms

VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …

An effective method to improve nonlinearity value of substitution boxes based on random selection

F Artuğer, F Özkaynak - Information Sciences, 2021 - Elsevier
In today's digital society, new design alternatives are needed for substitution box structures,
which has critical importance in develo** secure information systems that are resistant to …

A novel S-box generator using Frobenius automorphism and its applications in image encryption

R Ali, J Ali, P **, MK Jamil - Nonlinear Dynamics, 2024 - Springer
The goal of cryptography is to provide algorithms that safeguard sensitive information sent
via unprotected networks. These methods encrypt the information, making it unintelligible …