Chaos in the real world: Recent applications to communications, computing, distributed sensing, robotic motion, bio-impedance modelling and encryption systems

G Grassi - Symmetry, 2021 - mdpi.com
Most of the papers published so far in literature have focused on the theoretical phenomena
underlying the formation of chaos, rather than on the investigation of potential applications of …

Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication

W El-Shafai, IM Almomani, A Alkhayer - IEEE Access, 2021 - ieeexplore.ieee.org
The rapid growth of multimedia communication systems has expanded the High-Efficiency
Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent …

A DNA based colour image encryption scheme using a convolutional autoencoder

F Ahmed, MU Rehman, J Ahmad, MS Khan… - ACM Transactions on …, 2023 - dl.acm.org
With the advancement in technology, digital images can easily be transmitted and stored
over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting …

Protecting digital images using keys enhanced by 2D chaotic logistic maps

M Abu-Faraj, A Al-Hyari, C Obimbo, K Aldebei… - Cryptography, 2023 - mdpi.com
This research paper presents a novel digital color image encryption approach that ensures
high-level security while remaining simple and efficient. The proposed method utilizes a …

Secure lightweight cryptosystem for IoT and pervasive computing

M Abutaha, B Atawneh, L Hammouri, G Kaddoum - Scientific Reports, 2022 - nature.com
Large volumes of sensitive data are being transferred among devices as the Internet of
Things (IoT) grows in popularity. As a result, security measures must be implemented to …

A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic

M Luis, L Daniel, A Isabel, A Deicy - Multimedia Tools and Applications, 2023 - Springer
Based on the combination of quaternion numbers, residual matrices, and chaotic attractors,
a new cryptosystem is proposed for multimedia processing files such as images and audio …

Privacy protection in surveillance videos using block scrambling-based encryption and DCNN-based face detection

KM Hosny, MA Zaki, HM Hamza, MM Fouda… - IEEE …, 2022 - ieeexplore.ieee.org
Surely surveillance cameras are certainly important in all aspects of life. We have become in
an era where we need to use surveillance cameras everywhere, homes, schools, banks …

Chaos based encryption technique for compressed h264/avc videos

MA El-Mowafy, SM Gharghory, MA Abo-Elsoud… - IEEE …, 2022 - ieeexplore.ieee.org
Saving videos streaming from the unlawful users became an urgent claim. Cryptography
and Steganography are the most important and indispensable processes to protect and …

Privacy preserved video summarization of road traffic events for IoT smart cities

M Tahir, Y Qiao, N Kanwal, B Lee, MN Asghar - Cryptography, 2023 - mdpi.com
The purpose of smart surveillance systems for automatic detection of road traffic accidents is
to quickly respond to minimize human and financial losses in smart cities. However, along …

Selective encryption of the versatile video coding standard

M Farajallah, G Gautier, W Hamidouche… - IEEE …, 2022 - ieeexplore.ieee.org
versatile video coding (VVC) is the next generation video coding standard developed by the
joint video experts team (JVET) and released in July 2020. VVC introduces several new …