G Ghosh, S Verma, NZ Jhanjhi… - IOP conference series …, 2020 - iopscience.iop.org
In the current data transmission situation, digital images constitute a large part of visual communication. Their security is thus an essential field of concern. This paper analyses …
Objective In order to avoid the unauthorized access to private images and make a secure communication, an asymmetric image encryption algorithm based on SHA-3 and …
In this paper, a new chaotic image encryption and authentication model based on Elliptic Curves is proposed. The Elliptic Curve Diffie-Hellman (ECDH) is used to generate a reliable …
Chaotic maps that can provide highly secure key sequences and ease of structure implementation are predominant requirements in image encryption systems. One …
The technological progression is raised as a hybrid ecosystem with the industrial Internet of Things (IIoT). Among them, healthcare is also broadly unified with the Internet of Things to …
M Wang, X Wang, C Wang, Z Xia, H Zhao, S Gao… - Chaos, Solitons & …, 2020 - Elsevier
This paper proposes a novel tent-dynamic cross coupled map lattice (TDCCML) by introducing the dynamic coupling coefficient. A large number of theoretical analysis and …
In this paper, we introduce a new one-dimensional modular chaotic system based on the composition of the cubic map and the exponential function (1-DCE). The evaluation results …
Y Zhao, R Meng, Y Zhang, Q Yang - Optik, 2023 - Elsevier
In this paper a new two-dimensional chaotic map based on Logistic map and Chebyshev map is proposed. The performance analysis and evaluation show the proposed map has a …
This paper presents a fast and lightweight image encryption technique founded on a new concept of progressive and selective diffusion. We make use of modified chaotic systems …