Image encryption based on 8D hyperchaotic system using Fibonacci Q-Matrix

G Biban, R Chugh, A Panwar - Chaos, Solitons & Fractals, 2023 - Elsevier
One of the key tenets of the enormous and still-expanding digital realm is the security of
images. In recent years, the interest in image encryption has increased among researchers …

Image security based on three-dimensional chaotic system and random dynamic selection

B Ran, T Zhang, L Wang, S Liu, X Zhou - Entropy, 2022 - mdpi.com
Image encryption based on a chaos system can effectively protect the privacy of digital
images. It is said that a 3D chaotic system has a larger parameter range, better …

A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security

A Attkan, V Ranga, P Ahlawat - ACM Transactions on Internet of Things, 2023 - dl.acm.org
Over the past decade, IoT has gained huge momentum in terms of technological exploration,
integration, and its various applications even after having a resource-bound architecture. It is …

5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix

G Biban, R Chugh, A Panwar, M Sajid - Complexity, 2024 - Wiley Online Library
This article proposed an image encryption scheme along a novel five‐dimensional
hyperchaotic system and a Fibonacci Q‐matrix (FQ‐matrix) for gray images. This designed …

A new encryption model for multimedia content using two dimensional Brownian motion and coupled map lattice

M Rawat, AS Bafila, S Kumar, M Kumar… - Multimedia Tools and …, 2023 - Springer
An image encryption model is presented in this paper. The model uses two-dimensional
Brownian Motion as a source of confusion and diffusion in image pixels. Shuffling of image …

Biomedical Image Security Based on 2D and 3D Chaotic Systems

NS Goje, RV Ravi, D Das… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Recently, identifying abnormalities via medical images became vital. As these images are
transferred across the IoMT network, they require high safety. Unauthorised use of the data …

STREAM ENCRYPTION METHOD BASED ON THE CHAOTIC BROWNIAN MOTION MODEL OF MOLECULES

VA Gasimov, JI Mammadov… - Procedia Computer …, 2022 - Elsevier
In terms of cryptanalysis resistance, chaos-based encryption methods, along with other
methods, have recently become popular. As an XOR cipher, pseudo-random numbers …

[PDF][PDF] A Study of Colour Image Encryption with Chaos Logistic Map and DNA Encoding Techniques

AK Chaukade, P Murali - … Journal for Research in Applied Science & …, 2022 - academia.edu
The encryption of image has really become an important task in today's world as there is a
continuous advancement of technology day-by-day. There is a need to protect the images …