[HTML][HTML] A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations

M Alawida, JS Teh, A Mehmood, A Shoufan - Journal of King Saud …, 2022 - Elsevier
Over the years, there has been considerable interest in the area of chaos-based encryption
due to the fact that cryptographic algorithms and chaotic maps share a wide-range of similar …

A RGB image encryption algorithm based on total plain image characteristics and chaos

MA Murillo-Escobar, C Cruz-Hernández… - Signal Processing, 2015 - Elsevier
Currently, color image encryption is important to ensure its confidentiality during its
transmission on insecure networks or its storage. The fact that chaotic properties are related …

A chaotic-based encryption/decryption framework for secure multimedia communications

I Yasser, MA Mohamed, AS Samra, F Khalifa - Entropy, 2020 - mdpi.com
Chaos-based encryption has shown an increasingly important and dominant role in modern
multimedia cryptography compared with traditional algorithms. This work proposes novel …

Efficient image encryption scheme based on generalized logistic map for real time image processing

AA Shah, SA Parah, M Rashid, M Elhoseny - Journal of Real-Time Image …, 2020 - Springer
In this era of the information age with digitalization, the transmission of sensitive real-time
image information over insecure channels is highly-likely to be accessed or even attacked …

A robust embedded biometric authentication system based on fingerprint and chaotic encryption

MA Murillo-Escobar, C Cruz-Hernández… - Expert Systems with …, 2015 - Elsevier
Fingerprint recognition is a reliable solution in user authentication systems. Nevertheless,
the security and secrecy of the users data are a concern in today's biometric systems and …

A survey on chaos based image encryption techniques

M Kumar, A Saxena, SS Vuppala - Multimedia security using chaotic maps …, 2020 - Springer
Image encryption is an important area in recent days. It is widely known as an effective
method for secure transmission. The objective of any image encryption algorithm is to obtain …

An efficient and reliable chaos-based iot security core for udp/ip wireless communication

B Ilyas, SM Raouf, S Abdelkader, T Camel… - IEEE …, 2022 - ieeexplore.ieee.org
The ultimate focus of this paper is to provide a hyperchaos-based reconfigurable platform for
the real-time securing of communicating embedded systems interconnected in networks …

A double chaotic layer encryption algorithm for clinical signals in telemedicine

MA Murillo-Escobar, L Cardoza-Avendaño… - Journal of medical …, 2017 - Springer
Recently, telemedicine offers medical services remotely via telecommunications systems
and physiological monitoring devices. This scheme provides healthcare delivery services …

Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map

N Nesa, T Ghosh, I Banerjee - Journal of Information Security and …, 2019 - Elsevier
This paper introduces a novel Logarithmic Chaotic Map (LCM) that is inspired by the well
known quadratic map. The chaotic dynamic of the proposed map LCM is thoroughly …

Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller

MA Murillo-Escobar, C Cruz-Hernández… - Microprocessors and …, 2016 - Elsevier
Currently, several embedded applications in military, industry, banking transference, e-
commerce, biometric systems and others use insecure communication channels such as …