A review on applications of chaotic maps in pseudo-random number generators and encryption

RB Naik, U Singh - Annals of Data Science, 2024 - Springer
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …

Multimedia security using encryption: A survey

KM Hosny, MA Zaki, NA Lashin, MM Fouda… - IEEE …, 2023 - ieeexplore.ieee.org
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …

A multilayered audio signal encryption approach for secure voice communication

HA Abdallah, S Meshoul - Electronics, 2022 - mdpi.com
In this paper, multilayer cryptosystems for encrypting audio communications are proposed.
These cryptosystems combine audio signals with other active concealing signals, such as …

An audio encryption algorithm based on a non-degenerate 2D integer domain hyper chaotic map over GF(2n)

Y Cao, H Liu - Multimedia Tools and Applications, 2024 - Springer
To ensure the security transmission of audio signals in instant messaging tools, a chaos-
based dual-channel one-time one-key audio encryption scheme was proposed. First, a non …

Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function

B Rahul, K Kuppusamy, A Senthilrajan - Optik, 2023 - Elsevier
In today's world, a substantial number of digital images are conserved and transmitted
through diverse online platforms on a daily basis. Preserving the confidentiality of images is …

Securing dual-channel audio communication with a 2-D infinite collapse and logistic map

R Wu, S Gao, HHC Iu, S Zhou, U Erkan… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
To provide robust security measures for audio data during transmission, this article has
developed a novel dual-channel audio encryption scheme based on chaos theory …

An enhanced logistic chaotic map based tweakable speech encryption algorithm

D Herbadji, A Herbadji, H Kahia, A Belmeguenai… - Integration, 2024 - Elsevier
This work aims to improves the chaotic behavior of classical logistic chaotic system for voice
encryption. In this study, the classical chaotic system was enhanced. This enhanced map …

[HTML][HTML] Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity

RI Abdelfatah - Journal of King Saud University-Computer and …, 2024 - Elsevier
A significant problem facing cybersecurity is that most client/server identity authentication
schemes depend on computational complexity which is recently challenged by the super …

Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

B Rahul, K Kuppusamy, A Senthilrajan - Multimedia Tools and …, 2023 - Springer
Today, Internet users who share personal and professional data are concerned about the
safety of the data. Encryption is one way to safeguard sensitive and private data on internet …

The SPN network for digital audio data based on elliptic curve over a finite field

I Khalid, T Shah, KA Almarhabi, D Shah, M Asif… - IEEE …, 2022 - ieeexplore.ieee.org
The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for
secure data communication as it provides high security while utilizing the same size as the …