Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps

P Parida, C Pradhan, XZ Gao, DS Roy, RK Barik - IEEE Access, 2021 - ieeexplore.ieee.org
Many researchers have used the properties of the popular Elliptic Curve Cryptography
(ECC) to devise a stronger and faster image encryption algorithm to assure the secrecy of …

Designing hyperchaotic cat maps with any desired number of positive Lyapunov exponents

Z Hua, S Yi, Y Zhou, C Li, Y Wu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Generating chaotic maps with expected dynamics of users is a challenging topic. Utilizing
the inherent relation between the Lyapunov exponents (LEs) of the Cat map and its …

Gauss iterated map based RGB image encryption approach

A Sahay, C Pradhan - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Multimedia data are communicated to different servers over the network. Since the network
is public, the data security is highly required Data security is mostly done either by …

Robust and blind watermarking using Arnold 4D cat map in discrete wavelet

C Pradhan - International Journal of Information Technology, 2020 - Springer
Though watermarking got attention in the past decade, its robustness and security remain as
a challenge to the researchers. Here, one new technique has been proposed to counter …

2D-ZasHen Chaotic Map-Based Medical Image Cryptographic Approach in IoT-Based Healthcare Monitoring

S Amarouche, S Talbi, M Daoui… - 2023 20th ACS/IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is an innovative technology that is revolutionizing the global
economy and acquired significant recognition across various sectors, notably within the …

Multidimensional comparative analysis of image encryption using gauss iterated and logistic maps

A Sahay, C Pradhan - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Multimedia data are transferred through various networks for personal and professional
uses. Hence, everyone wants to send or receive the data in a secure manner without any …

Color image encryption technique using 4d logistic map

S Kumar, C Pradhan - Progress in Computing, Analytics and Networking …, 2020 - Springer
Due to the increased use of data transmission over the public channel, data security is
highly required. Chaotic maps are performing better in speed and robustness than the …

ENKRIPSI CITRA DIGITAL MENGGUNAKAN KOMPOSISI TRANSPOSISI CAT MAP DAN SUBTITUSI KEY STREAM LOGISTIC MAP

RD Syah, S Madenda, RJ Suhatril… - … Ilmiah Teknologi dan …, 2024 - ejournal.gunadarma.ac.id
Transmisi pertukaran data digital melalui jaringan internat menjadi hal penting pada
kemajuan teknologi. Risiko pembajakan oleh pihak yang tidak bertanggung jawab mungkin …

基于8 方向折叠与自更新置乱的图像加密算法

徐嵩松, 蒲斌 - 西南大学学报(自然科学版), 2018 - xbgjxt.swu.edu.cn
当前的图像加密算法主要是在一个方向上对像素进行扩散, 且在整个加密过程中,
都是利用相同的扩散, 混淆函数来改变像素位置与灰度值, 导致算法的随机度与安全性不佳 …

[PDF][PDF] 基于多方向像素连续折叠机制与Radon 变换的图像加密算法

孙力, 黄正谦, 项振茂 - 电信科学, 2017 - infocomm-journal.com
提出了基于多方向像素连续折叠机制与Radon 变换的图像加密算法, 从不同的方向,
利用不同的像素扩散技术来加密明文, 显著消除密文周期性. 首先, 对初始明文完成均等分割 …