A review on applications of chaotic maps in pseudo-random number generators and encryption

RB Naik, U Singh - Annals of Data Science, 2024 - Springer
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …

[HTML][HTML] Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions

J Moon, M Bukhari, C Kim, Y Nam, M Maqsood, S Rho - ICT Express, 2024 - Elsevier
This paper presents critical surveillance system functions and considers advances and
challenges for privacy and ethical implications. We examine privacy-protection strategies …

Image encryption algorithm with circle index table scrambling and partition diffusion

Y Zhou, C Li, W Li, H Li, W Feng, K Qian - Nonlinear dynamics, 2021 - Springer
This paper introduces an image encryption algorithm shorted as CITSPD, manipulated by
circle index table scrambling and partition diffusion. Firstly, the circle index table is obtained …

A new image encryption based on bit replacing, chaos and DNA coding techniques

SF Yousif, AJ Abboud, RS Alhumaima - Multimedia Tools and Applications, 2022 - Springer
Millions of confidential images are transmitted every day by people through the multimedia
systems of the internet. Such confidential information in the images may be belong to the …

Dual-domain image encryption in unsecure medium—a secure communication perspective

H Mahalingam, T Veeramalai, AR Menon… - Mathematics, 2023 - mdpi.com
With the growing demand for digitalization, multimedia data transmission through wireless
networks has become more prominent. These multimedia data include text, images, audio …

[PDF][PDF] Low power pseudo-random number generator based on lemniscate chaotic map

M Saber, MM Eid - International Journal of Electrical and …, 2021 - pdfs.semanticscholar.org
Lemniscate chaotic map (LCM) provides a wide range of control parameters, canceling the
need for several rounds of substitutions, and excellent performance in the confusion …

An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function

CM Kumar, R Vidhya, M Brindha - Applied Intelligence, 2022 - Springer
A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag
Scan based Convolution (ETS-ZSC) is proposed in this paper. A one-dimensional chaotic …

Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network

P Parida, C Pradhan, JA Alzubi, A Javadpour… - Multimedia Tools and …, 2023 - Springer
In this paper, a new chaotic image encryption and authentication model based on Elliptic
Curves is proposed. The Elliptic Curve Diffie-Hellman (ECDH) is used to generate a reliable …

Robust image encryption with scanning technology, the El-Gamal algorithm and chaos theory

SF Yousif, AJ Abboud, HY Radhi - IEEE Access, 2020 - ieeexplore.ieee.org
Digital images are the most frequently used signals to convey information in the internet era.
The security of these images is the primary concern in rapidly changing networked …

Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique

S Patel, KP Bharath, R Kumar - Multimedia Tools and Applications, 2020 - Springer
In present digital era, multimedia like images, text, documents and videos plays a vital role,
therefore due to increase in usage of digital data; there comes high demand of security …