A new color image encryption scheme based on 2DNLCML system and genetic operations
YQ Zhang, Y He, P Li, XY Wang - Optics and Lasers in Engineering, 2020 - Elsevier
Based on the spatiotemporal chaos of the two Dimensional Nonlinear Coupled Map Lattices
(2DNLCML) and genetic operations, a new optical color image encryption scheme is …
(2DNLCML) and genetic operations, a new optical color image encryption scheme is …
Double color images compression–encryption via compressive sensing
K Wang, X Wu, T Gao - Neural Computing and Applications, 2021 - Springer
In this paper, a new double color images encryption algorithm is introduced based on 2D
compressive sensing and wavelet basis, which can realize image encryption and …
compressive sensing and wavelet basis, which can realize image encryption and …
Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling
W Feng, YG He - IEEE Photonics Journal, 2018 - ieeexplore.ieee.org
In recent years, hybrid chaotic image encryption schemes combined with the DNA
encryption technology or other technologies have become a research focus of many …
encryption technology or other technologies have become a research focus of many …
Advances in Optical Image Compression and Encryption Methods
Y Qin, T Man, Y Wan, X Wang - Laser & Optoelectronics Progress, 2023 - researching.cn
Optical waves as information carriers can process two-dimensional information in parallel
with high speed and have many degrees of freedom (eg, wavelength, amplitude, phase, and …
with high speed and have many degrees of freedom (eg, wavelength, amplitude, phase, and …
Biomedical image encryption with a novel memristive chua oscillator embedded in a microcontroller
G Jeatsa Kitio, A Djomo Fanda… - Brazilian Journal of …, 2023 - Springer
In this paper, a chaos-based encryption/decryption scheme using a novel memristive Chua
oscillator to protect medical images is presented. The novel Chua oscillator is constructed by …
oscillator to protect medical images is presented. The novel Chua oscillator is constructed by …
A new finance chaotic system, its electronic circuit realization, passivity based synchronization and an application to voice encryption
Modelling and control applications of dynamical systems in chaos theory arising in several
areas are investigated and new control techniques are designed in the chaos literature. We …
areas are investigated and new control techniques are designed in the chaos literature. We …
5D Gauss map perspective to image encryption with transfer learning validation
S Salunke, B Ahuja, MF Hashmi, V Marriboyina… - Applied Sciences, 2022 - mdpi.com
Encryption of visual data is a requirement of the modern day. This is obvious and greatly
required due to widespread use of digital communication mediums, their wide range of …
required due to widespread use of digital communication mediums, their wide range of …
Asymmetric encryption of multi-image based on compressed sensing and feature fusion with high quality image reconstruction
XD Chen, Q Liu, J Wang, QH Wang - Optics & Laser Technology, 2018 - Elsevier
In this paper, an asymmetric multi-image encryption method based on compressed sensing
(CS) and feature fusion is proposed. The spectrums of four grayscale images are obtained …
(CS) and feature fusion is proposed. The spectrums of four grayscale images are obtained …
SoC-based edge computing gateway in the context of the internet of multimedia things: experimental platform
M Jridi, T Chapel, V Dorez, G Le Bougeant… - Journal of Low Power …, 2018 - mdpi.com
This paper presents an algorithm/architecture and Hardware/Software co-designs for
implementing a digital edge computing layer on a Zynq platform in the context of the Internet …
implementing a digital edge computing layer on a Zynq platform in the context of the Internet …
Image encryption algorithm based on 2D logistic map system in IoHT using 5G network
J Fotsing, JM Moukam Kakmeni, A Tiedeu… - Multimedia Tools and …, 2024 - Springer
In this paper, an image encryption technique is proposed to encrypt the images by using a
2D Logistic map with the SHA-256 sequence generator. The initial conditions and control …
2D Logistic map with the SHA-256 sequence generator. The initial conditions and control …