A coding layer robust reversible watermarking algorithm for digital image in multi-antenna system

K Yu, L Chen, Z Fu, Y Wang, T Lu - Signal Processing, 2022 - Elsevier
Although existing robust reversible watermarking (RRW) schemes are robust to image
processing attacks, they do not consider the effect of noise on the encoded digital images …

Constructing a discrete memristor chaotic map and application to hash function with dynamic S-Box

C Dong - The European Physical Journal Special Topics, 2022 - Springer
To meet the urgent demand of block chain and mass data, we designed a keyed chaos-
based hash function with parallel mode. First, a 2D non-degenerate memristor chaotic map …

Developing a new collision-resistant hashing algorithm

LV Cherckesova, OA Safaryan, NG Lyashenko… - Mathematics, 2022 - mdpi.com
Today, cryptographic hash functions have numerous applications in different areas. At the
same time, new collision attacks have been developed recently, making some widely used …

Hash function based on controlled alternate quantum walks with memory (September 2021)

Q Zhou, S Lu - IEEE Transactions on Quantum Engineering, 2021 - ieeexplore.ieee.org
We propose a Quantum inspired Hash Function using controlled alternate quantum walks
with Memory on cycles (QHFM), where the th message bit decides whether to run quantum …

Andro-BCFL: Blockchain and federated learning based Android malware detection

X Nannan, M Linyang, W Yangfan, M Yubo - Computers and Electrical …, 2025 - Elsevier
The widespread use of the Android operating system makes it an attractive target for
attackers. The ensuing Android malware continues to evolve in a sophisticated and …

Comparative Study on Hash Function Algorithms for Blockchain Technology

KY Pun, KM Mohamad… - … Technology And Computer …, 2024 - penerbit.uthm.edu.my
Cryptocurrency is the use of cryptography to create and distribute currency units making
cryptocurrency a peer-to-peer digital exchange system. Bitcoin is a popular cryptocurrency …

Secure One-Way Hash Function Using Cellular Automata for IoT

ST Wu, JR Chang - Sustainability, 2023 - mdpi.com
In the era of the Internet of Things (IoT), security is a very important issue. Recently, some
security studies have been proposed based on the applications of Cellular Automata (CA) …

Authenticated public key elliptic curve based on deep convolutional neural network for cybersecurity image encryption application

EAA Hagras, S Aldosary, H Khaled, TM Hassan - Sensors, 2023 - mdpi.com
The demand for cybersecurity is growing to safeguard information flow and enhance data
privacy. This essay suggests a novel authenticated public key elliptic curve based on a deep …

[PDF][PDF] Advanced Spatiotemporal Chaos-Based Hash Functions for Enhanced Security

Y Li - 2024 - scholar.archive.org
The domain of nonlinear science has witnessed a burgeoning interest in the study of
spatiotemporal chaos, prompting a deeper investigation into its complex dynamics. This …

Enhanced Security Hash Function Leveraging Chaotic Coupling Coefficient in Cross-Coupled Map Lattice

Y Li - 2024 - researchsquare.com
The recent surge in interest within the scientific community towards spatiotemporal chaos
underscores its potential for bolstering secure communications and cryptographic …