Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach
In recent years, numerous image encryption schemes have been developed that
demonstrate different levels of effectiveness in terms of robust security and real-time …
demonstrate different levels of effectiveness in terms of robust security and real-time …
Image encryption algorithm based on a new five dimensional Hyperchaotic system and Sudoku matrix
This paper advancement a new and active algorithm for the chaotic scheme centered on the
Sudoku matrix, where a new five-dimensional chaotic scheme is created to create the …
Sudoku matrix, where a new five-dimensional chaotic scheme is created to create the …
[PDF][PDF] Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT difusion: a robust data encryption approach
AB Usman, MM Hazzazi, MU Rehman… - Scientific …, 2024 - sure.sunderland.ac.uk
In recent years, numerous image encryption schemes have been developed that
demonstrate diferent levels of efectiveness in terms of robust security and real-time …
demonstrate diferent levels of efectiveness in terms of robust security and real-time …
[PDF][PDF] Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit
Information security is one of the most important branches concerned with maintaining the
confidentiality and reliability of data and the medium for which it is transmitted. Digital …
confidentiality and reliability of data and the medium for which it is transmitted. Digital …
Robust large image steganography using LSB algorithm and 5D hyper-chaotic system
JN Shehab, HA Abdulkadhim… - Bulletin of Electrical …, 2021 - beei.org
This paper contains a robust hiding system proposed to hide and reconstruct efficiently a
large size secret image based on merging encrypting and hiding. This approach deals with …
large size secret image based on merging encrypting and hiding. This approach deals with …
[PDF][PDF] Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network
Image encryption has become an important application aspect of information security. Most
attempts are focused on increasing the security aspect, the quality of the resulting image …
attempts are focused on increasing the security aspect, the quality of the resulting image …
Improving an Ultra Lightweight AES for IoT Applications
YS Vaz, JCB Mattos, RI Soares - … 9th World Forum on Internet of …, 2023 - ieeexplore.ieee.org
The universe of the Internet of Things has been expanding every year, supporting several
applications. However, this growth generates a massive amount of data that flows through …
applications. However, this growth generates a massive amount of data that flows through …
[PDF][PDF] Enhanced Image Encryption Using a Novel Chaotic System and Scramble Dithering Technique.
OA Jasim, SR Amer, SF Hussein… - International Journal of …, 2024 - researchgate.net
In the past years, the importance of using chaotic systems in encrypting media has
increased, for example, media (text, images, videos, etc.). To protect these media from the …
increased, for example, media (text, images, videos, etc.). To protect these media from the …
A color image encryption based on 5d hyper chaos-based system and dna dynamic coding
M Xiao, J Guo, B Sun, C Zhang - 2021 7th Annual International …, 2021 - ieeexplore.ieee.org
An image encryption scheme based on a five-dimensional hyper chaos-based system was
proposed and studied. In this scheme, the SHA-256 algorithm was used to generate the …
proposed and studied. In this scheme, the SHA-256 algorithm was used to generate the …
Design of a new 5-D dynamical system exhibiting chaotic behavior
HJ Shnaen, SA Mehdi - AIP Conference Proceedings, 2024 - pubs.aip.org
In this paper, anew five-dimension hyper chaotic system is introducing. A novel chaotic
system predicated on a five-dimensional framework was employed to augment the level of …
system predicated on a five-dimensional framework was employed to augment the level of …