Fractal sorting matrix and its application on chaotic image encryption

Y Xian, X Wang - Information Sciences, 2021 - Elsevier
This article creatively proposes a class of sorting matrices with fractal characteristics, named
the fractal sorting matrix (FSM), and introduces its iterative calculation method. The FSM is …

Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation

NR Zhou, LJ Tong, WP Zou - Signal Processing, 2023 - Elsevier
With quaternion theory, the traditional discrete fractional Tchebyshev transform is extended
to the quaternion algebra domain for multi-image processing. A new multi-image encryption …

PSO-based image encryption scheme using modular integrated logistic exponential map

O Kocak, U Erkan, A Toktas, S Gao - Expert Systems with Applications, 2024 - Elsevier
Image encryption (IE) has been essential for internet-based storing and transferring in recent
years. Effective chaotic systems play a crucial role in IE schemes which widely depend on …

Secure and energy efficient-based E-health care framework for green internet of things

M Kaur, D Singh, V Kumar, BB Gupta… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
This paper proposes a secure and energy-efficient Internet of Things (IoT) model for e-
health. The main objective is to secure the transmission and retrieval of biomedical images …

Fast image encryption algorithm based on parallel computing system

X Wang, L Feng, H Zhao - Information Sciences, 2019 - Elsevier
To ensure security, image encryption algorithms generally include two stages: permutation
and diffusion. The traditional image permutation algorithms include the sort-based …

A new hybrid digital chaotic system with applications in image encryption

M Alawida, A Samsudin, JS Teh, RS Alkhawaldeh - Signal Processing, 2019 - Elsevier
Image encryption provides confidentiality to images by transforming them into
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …

2D Logistic-Sine-coupling map for image encryption

Z Hua, F Jin, B Xu, H Huang - Signal Processing, 2018 - Elsevier
Image encryption is a straightforward strategy to protect digital images by transforming
images into unrecognized ones. The chaos theory is a widely used technology for image …

A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its' applications in image encryption

X Liu, X Tong, Z Wang, M Zhang - Chaos, Solitons & Fractals, 2022 - Elsevier
In view of the problem that dissipative chaos has attractors and is easy to be attacked by
reconstruction, which leads to the security defects of encryption algorithm based on …

Image encryption using 2D Logistic-adjusted-Sine map

Z Hua, Y Zhou - Information Sciences, 2016 - Elsevier
With complex properties of ergodicity, unpredictability and sensitivity to initial states, chaotic
systems are widely used in cryptography. This paper proposes a two-dimensional Logistic …

A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map

C Cao, K Sun, W Liu - Signal Processing, 2018 - Elsevier
In this paper, a new two-dimensional Logistic ICMIC cascade map (2D-LICM) is proposed
based on cascade modulation couple (CMC) model. Performance evaluations show that it …