[HTML][HTML] A novel secure communications scheme based on chaotic modulation, recursive encryption and chaotic masking

A Ouannas, A Karouma, G Grassi, VT Pham - Alexandria Engineering …, 2021 - Elsevier
The aim of this paper is to propose a new secure communications approach, obtained by
combining into one scheme chaotic modulation, recursive encryption and chaotic masking …

Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation

YQ Zhang, XY Wang - Nonlinear Dynamics, 2014 - Springer
Recently, a chaos-based symmetric image encryption scheme using a bit-level permutation
was proposed. In this paper, we analyze the potential flaws in Zhu's algorithm in detail and …

Suggested integral analysis for chaos-based image cryptosystems

MA Murillo-Escobar, MO Meranza-Castillón… - Entropy, 2019 - mdpi.com
Currently, chaos-based cryptosystems are being proposed in the literature to provide
confidentiality for digital images, since the diffusion effect in the Advance Encryption …

A new type of hybrid synchronization between arbitrary hyperchaotic maps

A Ouannas, AT Azar, R Abu-Saris - International Journal of Machine …, 2017 - Springer
In this paper, a new approach is proposed to investigate new type of hybrid chaos
synchronization in discrete-time hyperchaotic dynamical systems. We present, based on …

The fractional form of a new three-dimensional generalized Hénon map

L Jouini, A Ouannas, AA Khennaoui, X Wang… - Advances in Difference …, 2019 - Springer
In this paper, we propose a fractional form of a new three-dimensional generalized Hénon
map and study the existence of chaos and its control. Using bifurcation diagrams, phase …

A fingerprint image encryption scheme based on hyperchaotic Rössler map

F Abundiz-Pérez, C Cruz-Hernández… - Mathematical …, 2016 - Wiley Online Library
Currently, biometric identifiers have been used to identify or authenticate users in a
biometric system to increase the security in access control systems. Nevertheless, there are …

Extended logistic map for encryption of digital images

H Stanley, A Ramachandran - International Journal of Nonlinear …, 2022 - degruyter.com
A novel extended logistic map has been proposed and tested mathematically for security-
based applications. Because the designed extended logistic map behaves chaotically …

A new 2D-ASC chaotic system and its image encryption applications

J Peng, C Zhu, D Jiang - Modern Physics Letters B, 2023 - World Scientific
In this paper, a new 2D Arnold-sin-coupling (2D-ASC) hyperchaotic map is established and
a new image encryption algorithm based on bit-level operations and the ASC hyperchaotic …

Robust synchronization for 2-D discrete-time coupled dynamical networks

J Liang, Z Wang, X Liu… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
In this paper, a new synchronization problem is addressed for an array of 2-D coupled
dynamical networks. The class of systems under investigation is described by the 2-D …

Network synchronization of macm circuits and its application to secure communications

R Méndez-Ramírez, A Arellano-Delgado… - Entropy, 2023 - mdpi.com
In recent years, chaotic synchronization has received a lot of interest in applications in
different fields, including in the design of private and secure communication systems. The …