MZ Talhaoui, X Wang - Information Sciences, 2021 - Elsevier
Chaos theory has been widely used in the design of image encryption schemes. Some low- dimensional chaotic maps have been proved to be easily predictable because of their small …
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps. This combination …
Y Chen, C Tang, R Ye - Signal Processing, 2020 - Elsevier
A medical image encryption algorithm using high-speed scrambling and pixel adaptive diffusion was recently proposed by Hua et al. The algorithm mainly consists of random data …
W Feng, Z Qin, J Zhang, M Ahmad - IEEE Access, 2021 - ieeexplore.ieee.org
In order to improve the security and efficiency of image encryption, many researchers have continuously proposed new image encryption schemes in recent years. However, these …
In this paper, we propose a new real one-dimensional cosine polynomial (1-DCP) chaotic map. The statistical analysis of the proposed map shows that it has a simple structure, a high …
Z Liu, C Wu, J Wang, Y Hu - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, a color image encryption is proposed based on the dynamic DNA and the 4-D memristive hyper-chaos. First, chaotic matrices are generated from the 4-D memristive hyper …
W Feng, X Zhao, J Zhang, Z Qin, J Zhang, Y He - Mathematics, 2022 - mdpi.com
Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and …
K Qian, W Feng, Z Qin, J Zhang, X Luo, Z Zhu - Frontiers in Physics, 2022 - frontiersin.org
In recent years, many researchers have leveraged various memristors to design many novel memristive chaotic systems with complex dynamics. Compared with other chaotic systems …
H Li, T Li, W Feng, J Zhang, J Zhang, L Gan… - Journal of Information …, 2021 - Elsevier
As a medium that can convey information vividly, the application of digital images is increasingly widespread. Under various application environments, researchers are …