A secure image cryptosystem via multiple chaotic maps

MT Wazi, DS Ali, NMG Al-Saidi… - Discrete Mathematics …, 2022 - World Scientific
This work focused on introducing a new two-dimensional (2D) chaotic system. It is combined
of some existing maps, the logistic, iterative chaotic map with infinite collapse, and Henon …

[PDF][PDF] Texture images analysis using fractal extracted attributes

SA Yousif, AJ Mohammed… - International Journal of …, 2020 - researchgate.net
The extraction of texture attributes for image patterns is one of the vital tasks in the field of
pattern recognition. For this purpose, there is substantial demand for extracting new features …

A trustworthy online recommendation system based on social connections in a privacy-preserving manner

SY Chiou - Multimedia Tools and Applications, 2017 - Springer
Certain consumer websites provide reviews from previous buyers to help new customers
make purchasing decisions. However, fake reviews can have an adverse impact on user …

[PDF][PDF] Fractal Fourier transforms based image authentication

NM Al-Saidi, AJ Mohammed… - Proceedings of the World …, 2014 - researchgate.net
Fourier transform is an important role in major image processing issues used to represent an
image in a frequency domain. The fast evolution of digital images exchanges motivates to …

[PDF][PDF] Images Enhancement Based on a New Multi-Dimensional Fractal Created by Rectangular Function

RF Abbas - Engineering and Technology Journal, 2022 - iasj.net
The use of fractional and fractal notions has grown in popularity over the last twenty years
due to their benefits. Almost every study found that reordering these two principles resulted …

An Authenticated Privacy‐Preserving Mobile Matchmaking Protocol Based on Social Connections with Friendship Ownership

SY Chiou, CS Luo - Mathematical Problems in Engineering, 2014 - Wiley Online Library
The increase of mobile device use for social interaction drives the proliferation of online
social applications. However, it prompts a series of security and existence problems. Some …

Efficient image encryption via chaotic hight algorithm

WM Abed - International Journal of Nonlinear Analysis and …, 2022 - ijnaa.semnan.ac.ir
This paper is devoted to introducing a new three dimensions hyperchaotic system and
adapting it to enhance the Hight algorithm. The proposal hyperchaotic system with one …

Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties

SY Chiou - Mathematical Problems in Engineering, 2013 - Wiley Online Library
Mobile authentication can be used to verify a mobile user's identity. Normally this is
accomplished through the use of logon passwords, but this can raise the secret‐key …

Secure Mutual Authentication and Key-Agreement Protocol for IP Multimedia Server-Client

DB David, M Rajappa, T Karupuswamy… - Advanced Science …, 2014 - ingentaconnect.com
Since Social/Media Client has rapidly grown for Long Term Evolution (LTE) network, several
Authentication and Key Agreement (AKA) Protocols have proposed for securing its …

Fractal Fourier Coefficients With Application To Identification Protocols

NMG Al-Saidi, AJ Mohammed, EA Ogada… - … : Special Issue for the …, 2015 - World Scientific
Fourier transform has an important role in most image processing applications where an
image is represented in the frequency domain. Rapid evolution of digital images has …