Crypto key protection generated from images and chaotic logistic maps

K Srinivas, V Janaki, V Shankar… - Advanced Informatics for …, 2021 - Springer
Cryptography is a mechanism used for protection of valuable information from unacceptable
users in the networking world. It'sa challenging task to protect such assets from illegal users …

Key Generator to Encryption Images Based on Chaotic Maps

AH Kashmar, A Yousif - Iraqi Journal of Science, 2019 - iasj.net
It is known that images differ from texts in many aspects, such as high repetition and
correlation, local structure, capacitance characteristics and frequency. As a result, traditional …

[PDF][PDF] Chaotic image cryptography systems: a review

AH Khaleel, IQ Abduljaleel - Samarra J. Pure Appl. Sci, 2021 - iasj.net
In recent decades, image encryption has been a popular and important field of research.
The image encryption techniques have been studied thoroughly to ensure the safety of …

[PDF][PDF] Mixed Chaotic Keys to Protect Digital Color Image

Z Alqadi, A Mustafa - 2023 - academia.edu
A high speed and highly secure method of image cryptography will be introduced. The
introduced method will decrease the encryption time and increase the throughput of image …

Efficient cryptosystem for image security based on enhanced chaotic maps

QU Ain, MOU Islam, SA Parah - 2023 IEEE 4th Annual Flagship …, 2023 - ieeexplore.ieee.org
In this modern age, digital communication has revolutionized the way we connect with each
other, making communication faster, more convenient, and more accessible than ever …

Analysis on optimal ways to secure image encryption and decryption

A Chamoli, J Ahmed, MA Alam… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
In the last two decades chaos has been among the most important cryptology design
methods to design modern encryption algorithms. Suggestions were found to be very vulner …

A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map

M Akraam, T Rashid, S Zafar - Cluster Computing, 2024 - Springer
Digital images are information carriers in the latest era of technology. Therefore, securing
digital images or keeping data, videos, or confidential documents during communication …

[PDF][PDF] Multiple 3D Chaotic Keys to Protect Digital Images

Z Alqadi, RA Zneit - 2023 - researchgate.net
A simple, multipurpose, efficient, sensitive and highly qualities method of image
cryptography will be introduced in this research paper. The method will be easily used to …

A novel technique for secure data cryptosystem based on chaotic key image generation

MD Al-Hassani - Baghdad Science Journal, 2022 - bsj.uobaghdad.edu.iq
The advancements in Information and Communication Technology (ICT), within the previous
decades, has significantly changed people's transmit or store their information over the …

Symmetric key generation algorithm using image-based chaos logistic maps

K Srinivas, V Janaki - International Journal of Advanced …, 2021 - inderscienceonline.com
One of the latest hotspot in the current security trends is crypto image security ie, security
with images. In this paper, an algorithm for random bit sequence generator, based on …