Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments
Cloud services offer doctors and data scientists access to medical data from multiple
locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore …
locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore …
Dynamics, circuit design, feedback control of a new hyperchaotic system and its application in audio encryption
SM Fu, XF Cheng, J Liu - Scientific Reports, 2023 - nature.com
In this study, a 4D hyperchaotic system is constructed based on the foundation of a 3D Lü
chaotic system. The newly devised hyperchaotic system possesses a sole equilibrium point …
chaotic system. The newly devised hyperchaotic system possesses a sole equilibrium point …
[HTML][HTML] DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane
W Zhang, J Xu, B Zhao - Journal of King Saud University-Computer and …, 2023 - Elsevier
In response to the problem of uneven information distribution in DNA encoding, in this
article, a new DNA chaotic image encryption algorithm combining serrated spiral scrambling …
article, a new DNA chaotic image encryption algorithm combining serrated spiral scrambling …
DNA-chaos governed cryptosystem for cloud-based medical image repository
Nowadays, digital medical images have become an essential source for the grand success
of e-health technology. At the same time, the massive storage also plays a vital role. One of …
of e-health technology. At the same time, the massive storage also plays a vital role. One of …
Double quantum images encryption scheme based on chaotic system
SX Jiang, Y Li, J Shi, R Zhang - Chinese Physics B, 2024 - iopscience.iop.org
This paper explores a double quantum images representation (DNEQR) model that allows
for simultaneous storage of two digital images in a quantum superposition state …
for simultaneous storage of two digital images in a quantum superposition state …
An efficient and compromise-resilient image encryption scheme for resource-constrained environments
The secret keys produced by current image cryptosystems, which rely on chaotic sequences,
exhibit a direct correlation with the size of the image. As the image dimensions expand, the …
exhibit a direct correlation with the size of the image. As the image dimensions expand, the …
[PDF][PDF] Efficient Image Encryption via 2D Logistic Chaos Map**: Strengthening Security with Pixel-Level Dynamics
Y Wu, S Chu, H Bao, D Wang, J Zhou - Int. Arab. J. Inf. Technol., 2024 - iajit.org
This study presents an innovative image encryption algorithm anchored on the two-
dimensional Logistic chaotic system, designed to address the limitations of traditional …
dimensional Logistic chaotic system, designed to address the limitations of traditional …
Image encryption hiding algorithm based on digital time-varying delay chaos model and compression sensing technique
B **, L Fan, B Zhang, R Lei, L Liu - Iscience, 2024 - cell.com
Most of the existing image encryption algorithms encrypt images as meaningless
cryptographic images, which can easily attract the attention of attackers during transmission …
cryptographic images, which can easily attract the attention of attackers during transmission …
An authenticated spectrum acquirement and transmission of encrypted images over fusion centre
SS Shanthini, H Mahalingam, P VM… - Multimedia Tools and …, 2024 - Springer
These days, spectrum insufficiency is the most common issue. If the number of smartphone
users who access the radio spectrum grows, the radio spectrum becomes increasingly …
users who access the radio spectrum grows, the radio spectrum becomes increasingly …
A three-layer quantum multi-image encryption scheme
L Wang, Q Ran, J Ding - Quantum Information Processing, 2024 - Springer
In this paper, a new quantum representation for multiple images (QRMI) is presented, which
can save more storage space than the existing representations. Moreover, to improve …
can save more storage space than the existing representations. Moreover, to improve …