Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments

H Mahalingam, P Velupillai Meikandan, K Thenmozhi… - Mathematics, 2023 - mdpi.com
Cloud services offer doctors and data scientists access to medical data from multiple
locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore …

Dynamics, circuit design, feedback control of a new hyperchaotic system and its application in audio encryption

SM Fu, XF Cheng, J Liu - Scientific Reports, 2023 - nature.com
In this study, a 4D hyperchaotic system is constructed based on the foundation of a 3D Lü
chaotic system. The newly devised hyperchaotic system possesses a sole equilibrium point …

[HTML][HTML] DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane

W Zhang, J Xu, B Zhao - Journal of King Saud University-Computer and …, 2023 - Elsevier
In response to the problem of uneven information distribution in DNA encoding, in this
article, a new DNA chaotic image encryption algorithm combining serrated spiral scrambling …

DNA-chaos governed cryptosystem for cloud-based medical image repository

N Chidambaram, K Thenmozhi, P Raj… - Cluster Computing, 2024 - Springer
Nowadays, digital medical images have become an essential source for the grand success
of e-health technology. At the same time, the massive storage also plays a vital role. One of …

Double quantum images encryption scheme based on chaotic system

SX Jiang, Y Li, J Shi, R Zhang - Chinese Physics B, 2024 - iopscience.iop.org
This paper explores a double quantum images representation (DNEQR) model that allows
for simultaneous storage of two digital images in a quantum superposition state …

An efficient and compromise-resilient image encryption scheme for resource-constrained environments

AN Khan, A Mehmood, MNM Bhutta, IA Khan, AR Khan - Plos one, 2024 - journals.plos.org
The secret keys produced by current image cryptosystems, which rely on chaotic sequences,
exhibit a direct correlation with the size of the image. As the image dimensions expand, the …

[PDF][PDF] Efficient Image Encryption via 2D Logistic Chaos Map**: Strengthening Security with Pixel-Level Dynamics

Y Wu, S Chu, H Bao, D Wang, J Zhou - Int. Arab. J. Inf. Technol., 2024 - iajit.org
This study presents an innovative image encryption algorithm anchored on the two-
dimensional Logistic chaotic system, designed to address the limitations of traditional …

Image encryption hiding algorithm based on digital time-varying delay chaos model and compression sensing technique

B **, L Fan, B Zhang, R Lei, L Liu - Iscience, 2024 - cell.com
Most of the existing image encryption algorithms encrypt images as meaningless
cryptographic images, which can easily attract the attention of attackers during transmission …

An authenticated spectrum acquirement and transmission of encrypted images over fusion centre

SS Shanthini, H Mahalingam, P VM… - Multimedia Tools and …, 2024 - Springer
These days, spectrum insufficiency is the most common issue. If the number of smartphone
users who access the radio spectrum grows, the radio spectrum becomes increasingly …

A three-layer quantum multi-image encryption scheme

L Wang, Q Ran, J Ding - Quantum Information Processing, 2024 - Springer
In this paper, a new quantum representation for multiple images (QRMI) is presented, which
can save more storage space than the existing representations. Moreover, to improve …