EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory

S Gao, R Wu, X Wang, J Liu, Q Li, X Tang - Information Sciences, 2023 - Elsevier
Face recognition is a relatively common method humans use to confirm their identity.
Protecting the safe transmission of face images has become a hot issue. This paper …

[HTML][HTML] Cosine-transform-based chaotic system for image encryption

Z Hua, Y Zhou, H Huang - Information Sciences, 2019 - Elsevier
Chaos is known as a natural candidate for cryptography applications owing to its properties
such as unpredictability and initial state sensitivity. However, certain chaos-based …

A color image cryptosystem based on dynamic DNA encryption and chaos

X Chai, X Fu, Z Gan, Y Lu, Y Chen - Signal Processing, 2019 - Elsevier
This paper presents a color image cryptosystem based on dynamic DNA encryption and
chaos. The color plain image is firstly decomposed into red, green and blue components …

Two-dimensional memristive hyperchaotic maps and application in secure communication

H Li, Z Hua, H Bao, L Zhu, M Chen… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Continuous memristor has been widely used in chaotic oscillating circuits and neuromorphic
computing systems. However, discrete memristor and its coupling discrete map have not …

AEA-NCS: An audio encryption algorithm based on a nested chaotic system

R Wu, S Gao, X Wang, S Liu, Q Li, U Erkan… - Chaos, Solitons & …, 2022 - Elsevier
Audio information strongly correlates in adjacent times, and the data type of the audio is
float, so the traditional encryption algorithms for the image are unsuitable for audio …

An image encryption scheme based on a new hybrid chaotic map and optimized substitution box

MAB Farah, A Farah, T Farah - Nonlinear Dynamics, 2020 - Springer
This paper proposes a new hybrid chaotic map and a different way of using optimization
technique to improve the performance of encryption algorithms. Compared to other chaotic …

Hidden bursting firings and bifurcation mechanisms in memristive neuron model with threshold electromagnetic induction

H Bao, A Hu, W Liu, B Bao - IEEE transactions on neural …, 2019 - ieeexplore.ieee.org
Memristors can be employed to mimic biological neural synapses or to describe
electromagnetic induction effects. To exhibit the threshold effect of electromagnetic …

A new payload partition strategy in color image steganography

X Liao, Y Yu, B Li, Z Li, Z Qin - … on circuits and systems for video …, 2019 - ieeexplore.ieee.org
In traditional steganographic schemes, RGB three channels payloads are assigned equally
in a true color image. In fact, the security of color image steganography relates not only to …

An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing

X Chai, H Wu, Z Gan, D Han, Y Zhang, Y Chen - Information Sciences, 2021 - Elsevier
An efficient visually meaningful double color image encryption algorithm is proposed by
combining 2D compressive sensing (CS) with an embedding technique. First, two color …

Color image compression and encryption scheme based on compressive sensing and double random encryption strategy

X Chai, J Bi, Z Gan, X Liu, Y Zhang, Y Chen - Signal Processing, 2020 - Elsevier
Based on compressive sensing and double random encryption strategy, a novel color image
compression and encryption scheme is proposed in this paper. The architecture of …