[HTML][HTML] 基于忆阻隐藏超混沌系统的图像加密算法研究

聂浩, 陆安江 - Modeling and Simulation, 2023 - hanspub.org
针对传统超混沌Lorenz 系统应用于图像加密时, 存在密钥空间小, 安全性不高等问题, 本文在lv
混沌系统的基础上, 通过添加磁控忆阻器, 提出一种具有稳定平衡点的四维忆阻超混沌系统 …

A Proposal of a New Chaotic Map for Application in the Image Encryption Domain

F Abu-Amara, J Ahmad - Journal of Information & Knowledge …, 2023 - World Scientific
Several chaos-based image encryption schemes have been proposed in the last decade.
Each encryption scheme has pros and cons regarding its speed, complexity, and security …

Genetic Algorithm Using Feistel and Genetic Operator Acting at the Bit Level for Images Encryption.

A Abid, M Jarjar, M Kattass, H Rrghout… - … Journal of Safety & …, 2024 - search.ebscohost.com
In this paper, a new medical image encryption technique based on genetic algorithms acting
at the bit level will be developed. Initially, a transformation to a binary matrix notation of the …

Lightweight Image Encryption Scheme for IoT Environment and MachineLearning-Driven Robust S-box Selection

A Mehmood, A Shafique, AN Khan, M Alawida, J Shuja - 2024 - researchsquare.com
Abstract The Substitution Box (S-Box) plays a critical role in several block cipher
cryptosystems due to its ability to provide essential properties of non-linearity and confusion …

Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption

H Rrghout, M Kattass, M Jarjar, N Benazzi… - … , Intelligence and Data …, 2023 - Springer
In this work, we will propose a new color image encryption technique using chaotic maps
and based on an improved Feistel scheme. This scheme is reinforced by two genetic …

Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption

Y Qobbi, A Jarjar, A Benazzi - Computing, Internet of Things and …, 2024 - books.google.com
In this work, we will propose a new color image encryption technique using chaotic maps
and based on an improved Feistel scheme. This scheme is reinforced by two genetic …

Image Encryption Algorithm Based on Improved Hill Cipher Using the 2D Logistic Map

S El Kaddouhi, Y Qobbi, A Abid, M Jarjar… - … Conference on Digital …, 2023 - Springer
This paper proposes a novel image encryption method, which is based on an improvement
of the classic HILL technique using the 2D logistic map. First vectorize the original image …

[PDF][PDF] ASSESSMENT COMMITTEE

M KHERALLAH - 2024 - researchgate.net
The Most multimedia files, especially those containing private information are images. Since
multimedia transmission takes place on public communication channels, it is more …

Robust Image Encryption Algorithm Using a New Variant of Hill Cipher

H Rrghout, M Kattass, Y Qobbi, N Benazzi… - Proceedings of the 6th …, 2023 - dl.acm.org
In this work, a new approach to image encryption is proposed. This crypto system is
composed of two stages of the Hill cipher. First, a passage in vector of the original image is …

[PDF][PDF] JPEG Image Encryption Algorithm Based on Hyperchaotic, Mixed Hash and Dynamic DNA

QY Zhang, YT Ye - International Journal of Network Security, 2022 - ijns.jalaxy.com.tw
This paper proposes a new JPEG image encryption algorithm based on hyperchaotic, mixed
hash, and dynamic DNA to solve the problem of poor robustness and low efficiency in …