AN Kengnou Telem, HB Fotsin, J Kengne - Multimedia Tools and …, 2021 - Springer
This paper presents a new image encryption algorithm based on 3D chaotic system and deoxyribonucleic acid (DNA) coding. It uses two keys, an external one of 128 bits long and …
J Khan, JP Li, B Ahamad, S Parveen, AU Haq… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Things is made of diverse networked things (ie, smart, intelligent devices) that are consistently interconnected, producing meaningful data across the network without …
X Wang, S Gao - Multimedia Tools and Applications, 2021 - Springer
Based on the n-ary counting system, combined with the matrix semi-tensor product theory and Hilbert curve, a chaotic image encryption algorithm is designed. Different from the …
The technological progression is raised as a hybrid ecosystem with the industrial Internet of Things (IIoT). Among them, healthcare is also broadly unified with the Internet of Things to …
T Huang, Y Chen, B Yao, B Yang, X Wang, Y Li - Information Sciences, 2020 - Elsevier
Target recognition based on a high-resolution range profile (HRRP) has always been a research hotspot in the radar signal interpretation field. Deep learning has been an …
A Alghafis, N Munir, M Khan - Multimedia Tools and Applications, 2021 - Springer
In this research article, we have proposed a novel image encryption scheme for the confidentiality of digital information. The modern block ciphers based on confusion and …
Recently a hybrid secure image encryption scheme based on Julia set and three- dimensional Lorenz chaotic system was suggested. The offered scheme was based on the …
MM Khayyat, MM Khayyat, S Abdel-Khalek… - Alexandria Engineering …, 2022 - Elsevier
Abstract Industrial Internet of Things (IIoT) denotes a network of interlinked sensors, instruments, and other devices for industrial applications in the domains of manufacturing …
C Prabha, N Sharma, J Singh… - … and Smart Energy …, 2023 - ieeexplore.ieee.org
Security has become more important in several industries in recent years. It's not that the necessity to protect data is new; it dates back to the first and second world wars, and even to …