H Li, S Yu, W Feng, Y Chen, J Zhang, Z Qin, Z Zhu… - Entropy, 2023 - mdpi.com
Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain …
C Wang, L Song - Information Sciences, 2023 - Elsevier
In this paper, we propose a novel image encryption scheme based on a chaotic system and compressed sensing for multiple application scenarios. It is a dedicated scheme for JPEG …
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to improve the security against modern computational attacks. However …
Image encryption schemes that use substitution box (S-box) generators, and dynamic S- boxes in particular, have attracted wide research interest recently. Typically, the security of S …
The quality of encryption is dependent on the complexity of the confusion-diffusion pattern and the quality of the keystream employed. To enhance complexity and randomness, this …
JIM Bezerra, G Machado, A Molter, RI Soares… - Chaos, Solitons & …, 2023 - Elsevier
The constant increase of devices connected to the internet and the development and spread of technologies such as 5G leads to substantial growth in data-sharing over non-secure …
In recent years, there are numerous studies on chaotic systems with special equilibrium curves having various shapes such as circle, butterfly, heart and apple. This paper describes …
C Zhang, H Fan, M Zhang, H Lu, M Li, Y Liu - Optik, 2023 - Elsevier
In the latest research on image compression and encryption, more and more encryption schemes associate key generation mechanism with plaintext to resist various attacks. This …
In order to address the security risks associated with the theft of private images over open Internet of Things (IoT), this paper introduces a new Logistic-Sine-Coupling Map (LoSCM) in …