JS Khan, SK Kayhan - Journal of Information Security and Applications, 2021 - Elsevier
Out of various cryptographic attacks, Chosen-Plaintext Attack (CPA) is one of the most powerful and widely used attack on encrypted images. In order to efficiently resist such a …
L Liu, D Jiang, X Wang, X Rong, R Zhang - Journal of Information Security …, 2021 - Elsevier
With the increasing requirements of the performance in secure communication filed based on chaos, chaotic systems have been gradually developed into higher dimensions. Because …
In this paper, an effective sine modular arithmetic chaotic model is proposed, and applied to image encryption. The new system is a combination of module operation, Sine map and …
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims. We address this problem …
Transmission of multimedia data such as images, videos, and audio over the Internet is risky due to cyberattacks. To overcome the security issues, several encryption schemes are …
As big data, its technologies, and application continue to advance, the Smart Grid (SG) has become one of the most successful pervasive and fixed computing platforms that efficiently …
E Güvenoğlu - Connection Science, 2024 - Taylor & Francis
This study introduces a novel symmetric image encryption algorithm that employs a multi- layered architecture of chaotic maps, incorporating both confusion and diffusion …
The triple data encryption standard (3DES) has played a key role in the field of data encryption over the past few decades. However, the ciphertext's security is decreased by the …
J Shen, Q Zhou, Q Wang, Y Gu - 2024 43rd Chinese Control …, 2024 - ieeexplore.ieee.org
This paper introduces an image encryption algorithm based on 2D-Sine-Cosine chaotic mapping and compressed sensing technology. This algorithm introduces a novel 2D-Sine …