[HTML][HTML] A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps

W Feng, J Yang, X Zhao, Z Qin, J Zhang, Z Zhu, H Wen… - Mathematics, 2024 - mdpi.com
Chaos-based encryption is promising for safeguarding digital images. Nonetheless, existing
chaos-based encryption algorithms still exhibit certain shortcomings. Given this, we propose …

OSMRD-IE: octal-based shuffling and multi-layer rotational diffusing image encryption using 2D hybrid Michalewicz-Ackley map

U Erkan, A Toktas, S Memis, F Toktas… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The security of a chaos-based image encryption (IE) systems is based upon chaotic map's
performance and the encryption algorithm's permutation and diffusion strategies …

Temporal action segmentation for video encryption

S Gao, HHC Iu, J Mou, U Erkan, J Liu, R Wu… - Chaos, Solitons & …, 2024 - Elsevier
Videos contain temporal information, enabling them to capture the dynamic changes of
actions and provide richer visual effects. Traditional video encryption methods involve …

A universal image compression sensing–encryption algorithm based on DNA-triploid mutation

Y Cao, L Tan, X Xu, B Li - Mathematics, 2024 - mdpi.com
With the fast growth of information technology (IT), the safety of image transmission and the
storing of images are becoming increasingly important. Traditional image encryption …

Design and encryption application of multi-scroll chain-loop memristive neural networks with initial-boosting coexisting attractors

Q Lai, Y Chen - Chaos, Solitons & Fractals, 2024 - Elsevier
Memristor has been universally accepted as the perfect device for simulating neuromorphic
synapse, sparking recent and widespread interest in the study of memristive neural networks …

[HTML][HTML] A low-time-consumption image encryption combining 2D parametric Pascal matrix chaotic system and elementary operation

J Lu, J Zhang, D An, D Hao, X Ren, R Zhao - Journal of King Saud …, 2024 - Elsevier
The rapid development of the big data era has resulted in traditional image encryption
algorithms consuming more time in handling the huge amount of data. The consumption of …

[PDF][PDF] Comparative Analysis of the Chaotic Behavior of a Five-Dimensional Fractional Hyperchaotic System with Constant and Variable Order.

AM Alqahtani, A Chaudhary, RS Dubey… - Fractal & …, 2024 - pdfs.semanticscholar.org
A five-dimensional hyperchaotic system is a dynamical system with five state variables that
exhibits chaotic behavior in multiple directions. In this work, we incorporated a 5D …

Chaotic Image Encryption Scheme Based on Improved Z‐Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li‐Fi Approach

SBN Fotso, JH Talla Mbé, WN Atchoffo… - …, 2024 - Wiley Online Library
Image encryption schemes are predominantly software‐based. Only a select few have been
implemented in real‐life communication systems. This paper introduces a novel chaotic …

Image encryption based on a coined chaotic system and high-intensity encryption primitives

G Cao, Y Tao, X Liu, T Zhang - IEEE access, 2024 - ieeexplore.ieee.org
Security and efficiency are two major themes of image encryption algorithm. To enhance the
security together with improving the operational efficiency, this paper proposes an image …

[HTML][HTML] FPGA Realization of an Image Encryption System Using a 16-CPSK Modulation Technique

JC Nuñez-Perez, MA Estudillo-Valdez… - Electronics, 2024 - mdpi.com
Nowadays, M-Quadrature Amplitude Modulation (M-QAM) techniques are widely used to
modulate information by bit packets due to their ability to increase transfer rates. These …