Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA)

S Stalin, P Maheshwary, PK Shukla… - Journal of medical …, 2019 - Springer
This paper proposes an innovative image cryptosystem algorithm using the properties of the
block encryption, 4D logistic map and DNA systems. Multiple key sequences are generated …

[PDF][PDF] An Approach for Securing JSON Objects through Chaotic Synchronization

OS Gómez, RH Rosero, JC Estrada-Gutiérrez… - Cybernetics and …, 2022 - sciendo.com
Nowadays the interoperability of web applications is carried out by the use of data exchange
formats such as XML and JavaScript Object Notation (JSON). Due to its simplicity, JSON …

Data security using RTL algorithm with chaos synchronization for VLC system

V Prakash, CT Manimegalai - Journal of Optics, 2022 - Springer
The latest upcoming technology of visible light communication (VLC) system has become a
beneficial part of most of the applications than older communication mechanisms of …

[HTML][HTML] Steganography applied in the origin claim of pictures captured by drones based on chaos

M Jiménez-Rodríguez, CE Padilla-Leyferman… - Ingeniería e …, 2018 - scielo.org.co
In this work, steganography is implemented in photographs captured by an unmanned aerial
vehicle (drone), with the purpose of adding an identifier that indicates which device they are …

A portable embedded system for point-to-point secure signals transmission

M Jiménez, ME Cano, O Flores, JC Estrada - Microprocessors and …, 2018 - Elsevier
In this work, an embedded system for point-to-point secure transmission of encrypted signals
was developed. This portable system, which is also experimentally analyzed includes …

[HTML][HTML] Algoritmo de Encriptacion de Imágenes utilizando el atractor caótico de Lorenz

IF Rodriguez, EI Amaya, CA Suarez, JD Moreno - Ingeniería, 2017 - scielo.org.co
Contexto: Con el creciente volumen de information generada en tiempo real, nuevos
mecanismos son necesarios para garantizar su seguridad, evitando el acceso a personas …

Clasificación de criptogramas faciales a través de sus características de textura local

MJ Rodríguez, JTG Bonilla, JA Santiago… - Ingeniería e …, 2024 - search.proquest.com
Con el uso creciente de las redes sociales, personas no autorizadas han conseguido
detectar o interceptar datos personales, que podrían utilizarse de manera inapropiada …

Images encryption algorithm using the lorenz's chaotic attractor

IF Rodriguez, EI Amaya, CA Suarez, JD Moreno - Ingeniería, 2017 - scielo.org.co
Abstract RODRIGUEZ, Ivan Felipe; AMAYA, Edilma Isabel; SUAREZ, Cesar Augusto and
MORENO, Jose David. Images Encryption Algorithm Using the Lorenz's Chaotic Attractor …

System to safeguard the identity of persons in photographs through cryptography and steganography techniques using chaos

O Flores Siordia, JCE Gutiérrez… - Security and …, 2018 - Wiley Online Library
Safeguarding the identity of people in photographs or videos published through social
networks or television is of great importance to those who do not wish to be recognized. In …

Secure communication system in maritime navigation using state observer with linear matrix inequality

X Xu, T Ngoc Cuong, SD Lee… - Journal of International …, 2020 - Taylor & Francis
With emerge of smart navigation, the secure communication issues have drawn extensive
attention on maritime agendas between ships or with the shore. This paper presents a …