Color image encryption algorithm based on novel 2D hyper-chaotic system and DNA crossover and mutation

Q Wang, X Zhang, X Zhao - Nonlinear Dynamics, 2023 - Springer
As the quick advancement of multimedia technology, images are employed extensively in
the domains of medicine, military, and transportation. In the meantime, image security has …

[HTML][HTML] Biometric information security based on double chaotic rotating diffusion

Z Man - Chaos, Solitons & Fractals, 2023 - Elsevier
Biometric technology is increasingly being used in various areas, including government law
enforcement, exit and entry management, visitor access control, user identification, and daily …

Comparison of two new chaos-based pseudorandom number generators implemented in microcontroller

D Murillo-Escobar, K Vega-Pérez, MA Murillo-Escobar… - Integration, 2024 - Elsevier
Chaos-based encryption algorithms uses a pseudorandom number generator (PRNG) to
generate chaotic dynamics to carry out the processes to encrypt different types of …

Chaos based speech encryption using microcontroller

N Charalampidis, A Iatropoulos, C Volos - Integration, 2024 - Elsevier
In this work a real-time chaos-based speech encryption scheme designed for low-cost
microcontroller implementation is presented. The method involves a two-step encryption …

Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques

T Sarsodia, UR Bhatt, R Upadhyay… - Security and …, 2024 - Wiley Online Library
Many real‐world applications, such as smart cities, industrial automation, health care, and
so forth, utilize IoT‐enabled devices as a part of wireless networks. IoT devices must have …

An enhanced key expansion module based on 2D hyper chaotic map and Galois field

Y Cao, H Liu - Integration, 2025 - Elsevier
Key expansion is an essential component in block cryptography, which serves the round
function. By analyzing key expansion module of AES, it is found that the round-keys are …

An enhanced logistic chaotic map based tweakable speech encryption algorithm

D Herbadji, A Herbadji, H Kahia, A Belmeguenai… - Integration, 2024 - Elsevier
This work aims to improves the chaotic behavior of classical logistic chaotic system for voice
encryption. In this study, the classical chaotic system was enhanced. This enhanced map …

Intelligent Medical Multi-Department Information Attribute Encryption Access Control Method Under Cloud Computing.

S Liao - … Journal of Advanced Computer Science & …, 2024 - search.ebscohost.com
This paper studies the encrypted access control method of smart medical multi-department
information attributes in the cloud computing environment. Under the current wave of …