[HTML][HTML] Rgb image encryption through cellular automata, s-box and the lorenz system

W Alexan, M ElBeltagy, A Aboshousha - Symmetry, 2022 - mdpi.com
The exponential growth in transmission of multimedia over the Internet and unsecured
channels of communications is putting pressure on scientists and engineers to develop …

[HTML][HTML] Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem

M Gabr, H Younis, M Ibrahim, S Alajmy, I Khalid… - Symmetry, 2022 - mdpi.com
The need for information security has become urgent due to the constantly changing nature
of the Internet and wireless communications, as well as the daily generation of enormous …

Real-time RGB image encryption for IoT applications using enhanced sequences from chaotic maps

DA Trujillo-Toledo, OR López-Bonilla… - Chaos, Solitons & …, 2021 - Elsevier
Four chaotic maps are used herein as case study to design an embedded cryptosystem
based on a pseudo-random number generator (PRNG). The randomness of the sequences …

Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic S-box

S Zhou, Y Qiu, X Wang, Y Zhang - Nonlinear Dynamics, 2023 - Springer
Chaotic systems are widely used in image encryption due to their sensitivity to initial values,
ergodicity, and other properties; many image encryption algorithms based on chaotic …

Image Encryption Through Rössler System, PRNG S-Box and Recamán's Sequence

M ElBeltagy, W Alexan, A Elkhamry… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
This paper proposes a lightweight image encryption scheme that is based on 3 stages. The
first stage incorporates the use of the Rössler attractor for the Rössler system, the second …

An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges

A Waheed, F Subhan, MM Suud, M Alam… - Multimedia Tools and …, 2023 - Springer
The expansion of worldwide networking has created new possibilities for management,
development, and presentation in the form of digital data. The uncomplicated accessibility to …

Image encryption through lucas sequence, s-box and chaos theory

W Alexan, M ElBeltagy… - 2021 8th NAFOSTED …, 2021 - ieeexplore.ieee.org
The need for image encryption schemes that are of low computation complexity is ever
increasing. Meanwhile, the use of chaotic functions and mathematical sequences to …

Efficient dynamic S-box generation using linear trigonometric transformation for security applications

AH Zahid, M Ahmad, A Alkhayyat, MT Hassan… - IEEE …, 2021 - ieeexplore.ieee.org
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …

Construction of s-boxes using different maps over elliptic curves for image encryption

M Ramzan, T Shah, MM Hazzazi, A Aljaedi… - IEEE …, 2021 - ieeexplore.ieee.org
In this article, we present an encryption technique that can encrypt any digital data. The
proposed scheme basically depends on a substitution-permutation network. Two separate …

An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques

MI Haider, T Shah, A Ali, D Shah, I Khalid - Mathematics and Computers in …, 2023 - Elsevier
Efficient multiple pseudo-random number sequences (PRNS) and substitution boxes (S-
boxes) are one of the most significant building blocks, which are jointly adopted normally for …