Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach

MM Hazzazi, MU Rehman, A Shafique, A Aljaedi… - Scientific Reports, 2024 - nature.com
In recent years, numerous image encryption schemes have been developed that
demonstrate different levels of effectiveness in terms of robust security and real-time …

Image encryption algorithm based on a new five dimensional Hyperchaotic system and Sudoku matrix

SA Mehdi, AA Kadhim - 2019 international engineering …, 2019 - ieeexplore.ieee.org
This paper advancement a new and active algorithm for the chaotic scheme centered on the
Sudoku matrix, where a new five-dimensional chaotic scheme is created to create the …

[PDF][PDF] Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT difusion: a robust data encryption approach

AB Usman, MM Hazzazi, MU Rehman… - Scientific …, 2024 - sure.sunderland.ac.uk
In recent years, numerous image encryption schemes have been developed that
demonstrate diferent levels of efectiveness in terms of robust security and real-time …

[PDF][PDF] Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit

KK Jabbar, MB Tuieb, SA Thajeel - International Journal of Electrical …, 2022 - academia.edu
Information security is one of the most important branches concerned with maintaining the
confidentiality and reliability of data and the medium for which it is transmitted. Digital …

Robust large image steganography using LSB algorithm and 5D hyper-chaotic system

JN Shehab, HA Abdulkadhim… - Bulletin of Electrical …, 2021 - beei.org
This paper contains a robust hiding system proposed to hide and reconstruct efficiently a
large size secret image based on merging encrypting and hiding. This approach deals with …

[PDF][PDF] Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network

RS Mohammed, KK Jabbar, HA Hilal - International Journal of …, 2021 - academia.edu
Image encryption has become an important application aspect of information security. Most
attempts are focused on increasing the security aspect, the quality of the resulting image …

Improving an Ultra Lightweight AES for IoT Applications

YS Vaz, JCB Mattos, RI Soares - … 9th World Forum on Internet of …, 2023 - ieeexplore.ieee.org
The universe of the Internet of Things has been expanding every year, supporting several
applications. However, this growth generates a massive amount of data that flows through …

[PDF][PDF] Enhanced Image Encryption Using a Novel Chaotic System and Scramble Dithering Technique.

OA Jasim, SR Amer, SF Hussein… - International Journal of …, 2024 - researchgate.net
In the past years, the importance of using chaotic systems in encrypting media has
increased, for example, media (text, images, videos, etc.). To protect these media from the …

A color image encryption based on 5d hyper chaos-based system and dna dynamic coding

M Xiao, J Guo, B Sun, C Zhang - 2021 7th Annual International …, 2021 - ieeexplore.ieee.org
An image encryption scheme based on a five-dimensional hyper chaos-based system was
proposed and studied. In this scheme, the SHA-256 algorithm was used to generate the …

Design of a new 5-D dynamical system exhibiting chaotic behavior

HJ Shnaen, SA Mehdi - AIP Conference Proceedings, 2024 - pubs.aip.org
In this paper, anew five-dimension hyper chaotic system is introducing. A novel chaotic
system predicated on a five-dimensional framework was employed to augment the level of …