[HTML][HTML] Rgb image encryption through cellular automata, s-box and the lorenz system

W Alexan, M ElBeltagy, A Aboshousha - Symmetry, 2022 - mdpi.com
The exponential growth in transmission of multimedia over the Internet and unsecured
channels of communications is putting pressure on scientists and engineers to develop …

[HTML][HTML] Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem

M Gabr, H Younis, M Ibrahim, S Alajmy, I Khalid… - Symmetry, 2022 - mdpi.com
The need for information security has become urgent due to the constantly changing nature
of the Internet and wireless communications, as well as the daily generation of enormous …

A novel chaotic image encryption technique based on multiple discrete dynamical maps

M Khan, F Masood - Multimedia Tools and Applications, 2019 - Springer
The propagation of information over insecure communication system is one of the most
important aspect of digitally advance era. The electronic information is travels in form of …

Image Encryption Through Rössler System, PRNG S-Box and Recamán's Sequence

M ElBeltagy, W Alexan, A Elkhamry… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
This paper proposes a lightweight image encryption scheme that is based on 3 stages. The
first stage incorporates the use of the Rössler attractor for the Rössler system, the second …

A novel modular approach based substitution-box design for image encryption

AH Zahid, E Al-Solami, M Ahmad - IEEE Access, 2020 - ieeexplore.ieee.org
In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …

Image encryption through lucas sequence, s-box and chaos theory

W Alexan, M ElBeltagy… - 2021 8th NAFOSTED …, 2021 - ieeexplore.ieee.org
The need for image encryption schemes that are of low computation complexity is ever
increasing. Meanwhile, the use of chaotic functions and mathematical sequences to …

Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications

M Ahmad, IA Khaja, A Baz, H Alhakami… - IEEE Access, 2020 - ieeexplore.ieee.org
Symmetric encryption has been considered as one of the essential means of ensuring
security of end to end communication. The robustness and strength of modern day block …

On the effect of chaotic system in performance characteristics of chaos based s-box designs

F Özkaynak - Physica A: Statistical Mechanics and its Applications, 2020 - Elsevier
Many cryptographic protocol have been realized using similarities between chaos and
cryptology. One of the most successful examples of these protocols has been s-box …

Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures

M Ahmad, E Al-Solami, AM Alghamdi… - IEEE Access, 2020 - ieeexplore.ieee.org
This paper presents a hybrid method for the construction of cryptographically strong bijective
substitution-boxes by utilizing the merits of chaotic map and algebraic groups. The hybrid …

A novel construction of dynamic S-box with high nonlinearity using heuristic evolution

AH Zahid, AM Iliyasu, M Ahmad, MMU Shaban… - IEEE …, 2021 - ieeexplore.ieee.org
For decades, the security and privacy of data are among the major challenges faced by
service providers dealing with public data. To cope with these challenges, most of the …