M Gabr, H Younis, M Ibrahim, S Alajmy, I Khalid… - Symmetry, 2022 - mdpi.com
The need for information security has become urgent due to the constantly changing nature of the Internet and wireless communications, as well as the daily generation of enormous …
Four chaotic maps are used herein as case study to design an embedded cryptosystem based on a pseudo-random number generator (PRNG). The randomness of the sequences …
S Zhou, Y Qiu, X Wang, Y Zhang - Nonlinear Dynamics, 2023 - Springer
Chaotic systems are widely used in image encryption due to their sensitivity to initial values, ergodicity, and other properties; many image encryption algorithms based on chaotic …
This paper proposes a lightweight image encryption scheme that is based on 3 stages. The first stage incorporates the use of the Rössler attractor for the Rössler system, the second …
A Waheed, F Subhan, MM Suud, M Alam… - Multimedia Tools and …, 2023 - Springer
The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The uncomplicated accessibility to …
The need for image encryption schemes that are of low computation complexity is ever increasing. Meanwhile, the use of chaotic functions and mathematical sequences to …
Protection of data transmitted over the network from illegal access is one of the major challenges being posed by exponential growth of data in online digital communication …
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate …
Efficient multiple pseudo-random number sequences (PRNS) and substitution boxes (S- boxes) are one of the most significant building blocks, which are jointly adopted normally for …