Image encryption algorithm based on 2D hyperchaotic map

X Gao - Optics & Laser Technology, 2021 - Elsevier
It is well known that chaos is unpredictability and sensitivity to initial values and parameters.
It is a best choice for cryptography application. However, the existing chaotic cryptography …

A chaotic-based encryption/decryption framework for secure multimedia communications

I Yasser, MA Mohamed, AS Samra, F Khalifa - Entropy, 2020 - mdpi.com
Chaos-based encryption has shown an increasingly important and dominant role in modern
multimedia cryptography compared with traditional algorithms. This work proposes novel …

[PDF][PDF] Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map.

AT Maolood, EK Gbashi, ES Mahmood - International Journal of …, 2022 - academia.edu
In the recent years, an increasing demand for securing visual resourceconstrained devices
become a challenging problem due to the characteristics of these devices. Visual resource …

Multichannel image encryption using dynamic substitution and JSMP map

EP Elias, A Santhanavijayan - Optik, 2023 - Elsevier
The confidentiality of images is crucial in medical, military, satellite, and IoT fields.
Encipherment ensures confidentiality, relying on strong Substitution boxes (S-boxes) and …

Chaos-based image encryption based on bit level cubic shuffling

L Moysis, I Kafetzis, A Tutueva, D Butusov… - Cybersecurity: A New …, 2022 - Springer
This work studies the problem of chaos-based image encryption. First, a generalization of
the 1D chaotic map proposed by (Talhaoui et al. in The Visual Computer, pp 1–11, 2020) is …

[PDF][PDF] Security of IoT: Tan-Bessel Function, S-box, and Sine-Logistic Map

R Saafan - 2022 - researchgate.net
Abstract The Internet of Things (IoT) has a huge impact on our daily life. IoT is a global
network of physical and virtual” things” connected to the internet and exchange data and …

[PDF][PDF] Augmented Image Encryption for Business Applications using Jigsaw Transform

H Essam - 2024 - researchgate.net
Nowadays, the need for secure image transmission is at an all-time high due to the
excessive volume of messages with images sent every day. Therefore, the importance of …

Cryptography using chaotic theory for image encryption and decryption

R Pandimeena, P Govardhana… - AIP Conference …, 2022 - pubs.aip.org
Nowadays, data transmission plays a vital role because every person sends and receives
confidential data every second. The name itself says secret, which should not be ready by …

[PDF][PDF] Hybrid Facial Chaotic-based Graphical Encryption Technique for Cloud Environment

A Manikandan, R Anandan - Webology, 2022 - webology.org
Pictographic representations are everywhere in this digital world. IoT, Cloud, Fog, and 5G
systems are becoming data transfer boosters for each user. In a real-world situation, secure …