[HTML][HTML] A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations

M Alawida, JS Teh, A Mehmood, A Shoufan - Journal of King Saud …, 2022 - Elsevier
Over the years, there has been considerable interest in the area of chaos-based encryption
due to the fact that cryptographic algorithms and chaotic maps share a wide-range of similar …

Implementing a symmetric lightweight cryptosystem in highly constrained IoT devices by using a chaotic S-box

BM Alshammari, R Guesmi, T Guesmi, H Alsaif… - Symmetry, 2021 - mdpi.com
In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data
collected from those devices can be the target of cyberattacks. In this paper, a lightweight …

Multimedia security using encryption: A survey

KM Hosny, MA Zaki, NA Lashin, MM Fouda… - IEEE …, 2023 - ieeexplore.ieee.org
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …

A multilayered audio signal encryption approach for secure voice communication

HA Abdallah, S Meshoul - Electronics, 2022 - mdpi.com
In this paper, multilayer cryptosystems for encrypting audio communications are proposed.
These cryptosystems combine audio signals with other active concealing signals, such as …

A robust chaos-based technique for medical image encryption

I Yasser, AT Khalil, MA Mohamed, AS Samra… - IEEE …, 2021 - ieeexplore.ieee.org
Transmission and storage of medical data using cloud-based Internet-of-health-systems
(IoHS) necessitate important prerequisites, such as secrecy, legitimacy, and integrity. This …

Chaos-based cryptography: Text encryption using image algorithms

M Lawnik, L Moysis, C Volos - Electronics, 2022 - mdpi.com
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular
stream-encryption algorithms, eg, textual data, are now rarely considered. This article …

[HTML][HTML] A new fractional-order chaotic system with its analysis, synchronization, and circuit realization for secure communication applications

ZASA Rahman, BH Jasim, YIA Al-Yasir, YF Hu… - Mathematics, 2021 - mdpi.com
This article presents a novel four-dimensional autonomous fractional-order chaotic system
(FOCS) with multi-nonlinearity terms. Several dynamics, such as the chaotic attractors …

A color image encryption scheme combining hyperchaos and genetic codes

H Nazir, IS Bajwa, S Abdullah, R Kazmi… - IEEE …, 2022 - ieeexplore.ieee.org
In consideration of the reduced chaotic range and susceptibility of a single chaotic map, we
exploit the 4D-hyperchaotic system for creating three S-boxes ie, red, green and blue S …

Fast colored video encryption using block scrambling and multi-key generation

KM Hosny, MA Zaki, NA Lashin, HM Hamza - The Visual Computer, 2023 - Springer
Multimedia information usage is increasing with new technologies such as the Internet of
things (IoT), cloud computing, and big data processing. Video is one of the most widely used …

Rating of Modern Color Image Cryptography: A Next‐Generation Computing Perspective

M Samiullah, W Aslam, MA Khan… - Wireless …, 2022 - Wiley Online Library
Issues such as inefficient encryption architectures, nonstandard formats of image datasets,
weak randomness of chaos‐based Pseudorandom Number Generators (PRNGs), omitted S …