H Kolivand, SF Hamood… - Multimedia Tools …, 2024 - researchonline.ljmu.ac.uk
This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to image encryption, providing an …
This paper proposes a new hybrid chaotic map and a different way of using optimization technique to improve the performance of encryption algorithms. Compared to other chaotic …
Four chaotic maps are used herein as case study to design an embedded cryptosystem based on a pseudo-random number generator (PRNG). The randomness of the sequences …
Privacy preservation has become a prerequisite for modern applications in the cloud, social media, Internet of things (IoT), and E-healthcare systems. In general, health and medical …
Designing efficient and secure cryptosystems has been a preoccupation for many scientists and engineers for a long time wherein they use chaotic systems to design new …
In this paper, a new one-dimensional discrete-space chaotic map based on the multiplication of integer numbers and circular shift is presented. Dynamical properties of the …
Chaos-based stream ciphers form a prospective class of data encryption techniques. Usually, in chaos-based encryption schemes, the pseudo-random generators based on …
Z Zhang, J Tang, H Ni, T Huang - Nonlinear Dynamics, 2023 - Springer
In this paper, a universal two-dimensional (2D) enhanced cosine coupled model (2D- ECCM) is first designed, which can construct new 2D chaotic systems using most of the …
Recently, a lot of research has been done in chaotic cryptography field using different kinds of chaotic systems, like chaotic maps, which are being considered as one of the secure and …