Chaos in the real world: Recent applications to communications, computing, distributed sensing, robotic motion, bio-impedance modelling and encryption systems
G Grassi - Symmetry, 2021 - mdpi.com
Most of the papers published so far in literature have focused on the theoretical phenomena
underlying the formation of chaos, rather than on the investigation of potential applications of …
underlying the formation of chaos, rather than on the investigation of potential applications of …
Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication
The rapid growth of multimedia communication systems has expanded the High-Efficiency
Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent …
Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent …
A DNA based colour image encryption scheme using a convolutional autoencoder
With the advancement in technology, digital images can easily be transmitted and stored
over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting …
over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting …
Protecting digital images using keys enhanced by 2D chaotic logistic maps
This research paper presents a novel digital color image encryption approach that ensures
high-level security while remaining simple and efficient. The proposed method utilizes a …
high-level security while remaining simple and efficient. The proposed method utilizes a …
Secure lightweight cryptosystem for IoT and pervasive computing
M Abutaha, B Atawneh, L Hammouri, G Kaddoum - Scientific Reports, 2022 - nature.com
Large volumes of sensitive data are being transferred among devices as the Internet of
Things (IoT) grows in popularity. As a result, security measures must be implemented to …
Things (IoT) grows in popularity. As a result, security measures must be implemented to …
A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic
M Luis, L Daniel, A Isabel, A Deicy - Multimedia Tools and Applications, 2023 - Springer
Based on the combination of quaternion numbers, residual matrices, and chaotic attractors,
a new cryptosystem is proposed for multimedia processing files such as images and audio …
a new cryptosystem is proposed for multimedia processing files such as images and audio …
Privacy protection in surveillance videos using block scrambling-based encryption and DCNN-based face detection
Surely surveillance cameras are certainly important in all aspects of life. We have become in
an era where we need to use surveillance cameras everywhere, homes, schools, banks …
an era where we need to use surveillance cameras everywhere, homes, schools, banks …
Chaos based encryption technique for compressed h264/avc videos
MA El-Mowafy, SM Gharghory, MA Abo-Elsoud… - IEEE …, 2022 - ieeexplore.ieee.org
Saving videos streaming from the unlawful users became an urgent claim. Cryptography
and Steganography are the most important and indispensable processes to protect and …
and Steganography are the most important and indispensable processes to protect and …
Privacy preserved video summarization of road traffic events for IoT smart cities
The purpose of smart surveillance systems for automatic detection of road traffic accidents is
to quickly respond to minimize human and financial losses in smart cities. However, along …
to quickly respond to minimize human and financial losses in smart cities. However, along …
Selective encryption of the versatile video coding standard
versatile video coding (VVC) is the next generation video coding standard developed by the
joint video experts team (JVET) and released in July 2020. VVC introduces several new …
joint video experts team (JVET) and released in July 2020. VVC introduces several new …