AN Kengnou Telem, HB Fotsin, J Kengne - Multimedia Tools and …, 2021 - Springer
This paper presents a new image encryption algorithm based on 3D chaotic system and deoxyribonucleic acid (DNA) coding. It uses two keys, an external one of 128 bits long and …
Y Si, H Liu, Y Chen - International Journal of Bifurcation and Chaos, 2021 - World Scientific
As the only nonlinear component for symmetric cryptography, S-Box plays an important role. An S-Box may be vulnerable because of the existence of fixed point, reverse fixed point or …
In the modern era, researchers have focused a great deal of effort on multimedia security and fast processing to address computational processing time difficulties. Due to limited …
One of the applications of dynamical systems with chaotic behavior is data encryption. Chaos-based cryptography uses chaotic dynamical systems as the basis for creating …
X Zhang, J Tian - Physica Scripta, 2022 - iopscience.iop.org
A large number of images are generated and distributed in various fields every day. To protect the image information from being stolen during the network transmission, this paper …
Within the domain of image encryption, an intrinsic trade-off emerges between computational complexity and the integrity of data transmission security. Protecting digital …
MU Rehman - Journal of King Saud University-Computer and …, 2024 - Elsevier
The proposed work delves into the utilization of chaotic maps along with the quantum mechanisms to strengthen the security of the digital images along with addressing the …
Transmission of multimedia data such as images, videos, and audio over the Internet is risky due to cyberattacks. To overcome the security issues, several encryption schemes are …
H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han… - IEEE …, 2021 - ieeexplore.ieee.org
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, they have low diffusion effects, compared to word-oriented binary and maximum …