Securing Digital Images through Simple Permutation‐Substitution Mechanism in Cloud‐Based Smart City Environment
Data security plays a significant role in data transfer in cloud‐based smart cities. Chaotic
maps are commonly used in designing modern cryptographic applications, in which one …
maps are commonly used in designing modern cryptographic applications, in which one …
A novel privacy approach of digital aerial images based on mersenne twister method with DNA genetic encoding and chaos
Aerial photography involves capturing images from aircraft and other flying objects,
including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can …
including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can …
Survey on mobile edge-cloud computing: A taxonomy on computation offloading approaches
IA Elgendy, R Yadav - Security and Privacy Preserving for IoT and 5G …, 2022 - Springer
With the technological evolution of Internet of Things (IoT) devices and wireless
communications, a wide variety of new complex mobile applications and different services …
communications, a wide variety of new complex mobile applications and different services …
Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality
Confidentiality of secret information is one of the mandatory issue of digitally modernized era
of science and technology. Due to availability of several online web applications and social …
of science and technology. Due to availability of several online web applications and social …
Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field
Image encryption is an evolving technique in the arena of data communication. In the last
decade, many encryption schemes have been suggested. Unfortunately, most of the current …
decade, many encryption schemes have been suggested. Unfortunately, most of the current …
Quaternion and multiple chaotic systems based pseudo-random number generator
L Li, B Abd-El-Atty, S Elseuofi… - 2019 2nd …, 2019 - ieeexplore.ieee.org
Quaternions are widely used in physics, geometry and image processing, which are hyper-
complex numbers applied in three-dimensional space. In this paper, we utilize the benefits …
complex numbers applied in three-dimensional space. In this paper, we utilize the benefits …
Simple chain automaton random number generator for IoT devices
Random numbers are very important in many fields of computer science. Generating high-
quality random numbers using only basic arithmetic operations is challenging, especially for …
quality random numbers using only basic arithmetic operations is challenging, especially for …
Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio
A Jayapalan, P Praveenkumar, P Savarinathan… - Security and Privacy …, 2022 - Springer
Cognitive Radio (CR) utilizes the free spectrum through a process called spectrum sensing
efficiently. This free spectrum is shared by many CR's in the wireless environment. Many CR …
efficiently. This free spectrum is shared by many CR's in the wireless environment. Many CR …
[PDF][PDF] Research Article Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment
Data security plays a significant role in data transfer in cloud-based smart cities. Chaotic
maps are commonly used in designing modern cryptographic applications, in which one …
maps are commonly used in designing modern cryptographic applications, in which one …