Image encryption algorithm based on 2D logistic map system in IoHT using 5G network
J Fotsing, JM Moukam Kakmeni, A Tiedeu… - Multimedia Tools and …, 2024 - Springer
In this paper, an image encryption technique is proposed to encrypt the images by using a
2D Logistic map with the SHA-256 sequence generator. The initial conditions and control …
2D Logistic map with the SHA-256 sequence generator. The initial conditions and control …
A novel Cosine-Cosine chaotic map-based video encryption scheme
S Kumari, M Dua, S Dua, D Dhingra - Journal of Engineering and Applied …, 2024 - Springer
The surge in online activities has led to the increasing popularity of sharing video data
across diverse applications, including online education tutorials, social networking, video …
across diverse applications, including online education tutorials, social networking, video …
Image encryption based on S-box generation constructed by using a chaotic autonomous snap system with only one equilibrium point
B Ramakrishnan, YPK Nkandeu, VK Tamba… - Multimedia Tools and …, 2024 - Springer
An autonomous chaotic snap system with only one equilibrium point is proposed and
analyzed in this paper. Periodic oscillations, self-excited chaotic attractors, hidden chaotic …
analyzed in this paper. Periodic oscillations, self-excited chaotic attractors, hidden chaotic …
On the Telemedicine Microcontroller‐Based ECG Security Using a Novel 4Wings‐4D Chaotic Oscillator (N4W4DCO)
BD Banmene Lontsi, GP Ayemtsa Kuete… - IET Circuits, Devices …, 2024 - Wiley Online Library
In this contribution, a chaos‐based microcontroller electrocardiogram (ECG) signal
acquisition‐security‐transmission system is proposed. It is designed based on a Novel …
acquisition‐security‐transmission system is proposed. It is designed based on a Novel …
Medical image cryptosystem using a new 3-D map implemented in a microcontroller
GP Ayemtsa Kuete, LM Heucheun Yepdia… - Multimedia Tools and …, 2024 - Springer
Medical images make up for more than 25% of global attacks on privacy. Securing them is
therefore of utmost importance. Chaos based image encryption is one of the most method …
therefore of utmost importance. Chaos based image encryption is one of the most method …
Design and implementation in an Altera's cyclone IV EP4CE6E22C8 FPGA board of a fast and robust cipher using combined 1D maps
AF Djomo, A Tiedeu, J Fotsing - IET Image Processing, 2024 - Wiley Online Library
This paper proposes an image encryption algorithm based on combined 1D chaotic maps.
First, a permutation technique was applied. It was then reorganized into 1D matrices along …
First, a permutation technique was applied. It was then reorganized into 1D matrices along …
Multi‐chaotic maps and blockchain based image encryption
The vast technological developments make data transmission more frequent over networks.
So, the data needs to be secured and for that reason, there is a requirement to develop an …
So, the data needs to be secured and for that reason, there is a requirement to develop an …
The application of SOFNN based on PSO-ILM algorithm in nonlinear system modeling
H Deng, L Liu, J Fang, L Yan - Applied Intelligence, 2023 - Springer
Fuzzy neural network (FNN) is the product of the combination of fuzzy theory and neural
network. It combines the advantages of neural network and fuzzy theory, which has …
network. It combines the advantages of neural network and fuzzy theory, which has …
Efficient implementation of a raptor coding scheme over OFDM channel
HAA El-Hameed, NM El-Gohary, NA El-Hag - Journal of Optics, 2024 - Springer
The reliable and secure transmission of digital images over wireless networks presents
significant challenges in contemporary communication systems. Chaotic map-based …
significant challenges in contemporary communication systems. Chaotic map-based …