Performance comparison of Linear Congruent method and Fisher-Yates Shuffle for data randomization
FP Juniawan, HA Pradana… - Journal of Physics …, 2019 - iopscience.iop.org
Abstract Linear Congruent Method (LCM) and Fisher-Yates Shuffle Algorithms are widely
known and used in various fields and needs. Both of these algorithms are used because of …
known and used in various fields and needs. Both of these algorithms are used because of …
BlackJack: Secure machine learning on IoT devices through hardware-based shuffling
Neural networks are seeing increased use in diverse Internet of Things (IoT) applications
such as healthcare, smart homes and industrial monitoring. Their widespread use makes …
such as healthcare, smart homes and industrial monitoring. Their widespread use makes …
A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling
P Cao, L Teng - Nonlinear Dynamics, 2024 - Springer
This paper introduces a new one-dimensional chaotic system, which can be considered as
an improvement upon the Bernoulli map. The Quadratic Bernoulli Chaotic System (QBCS) is …
an improvement upon the Bernoulli map. The Quadratic Bernoulli Chaotic System (QBCS) is …
Hybrid image crypto system for secure image communication–A VLSI approach
B Ramalingam, A Rengarajan… - Microprocessors and …, 2017 - Elsevier
This work presents permutation and diffusion based hybrid image crypto system in transform
domain using combined chaotic maps and Haar Integer Wavelet Transform (HIWT). HIWT is …
domain using combined chaotic maps and Haar Integer Wavelet Transform (HIWT). HIWT is …
Fisher-Yates chaotic shuffling based visual cryptography scheme for multimodal biometric authentication
M Gayathri, C Malathy - Wireless Personal Communications, 2022 - Springer
In the existing multimodal biometric authentication technique, there is no integrity in the
biometric information, and authentication of end users is also not very secured. In this paper …
biometric information, and authentication of end users is also not very secured. In this paper …
A novel dual purpose spatial domain algorithm for digital image watermarking and cryptography using Extended Hamming Code
The tremendous growth of internet in the recent years has made possible easier copying,
manipulation and redistribution of digital media. As a result, the problem of security and …
manipulation and redistribution of digital media. As a result, the problem of security and …
The creation of maze in order to hide data, and the proposal of method based on AES data encryption algorithm
E Güvenoğlu, C Razbonyalı - El-Cezeri, 2019 - dergipark.org.tr
The field of science, which enables the transmission of private data in multimedia
environments such as display, audio and video, is called steganography. The widespread …
environments such as display, audio and video, is called steganography. The widespread …
Secure Medical Image Transmission Using 2‐D Tent Cascade Logistic Map
LR Jonisha Miriam, A Lenin Fred… - … Data Engineering for …, 2024 - Wiley Online Library
Secure image communication is becoming more and more important owing to stealing and
content manipulation. To protect the confidential image from unauthorized access …
content manipulation. To protect the confidential image from unauthorized access …
Resim şifreleme amacıyla dinamik S kutusu tasarımı için bir yöntem
E Güvenoğlu - El-Cezeri, 2016 - dergipark.org.tr
Yer değiştirme kutuları (Substitution Box, s-box) blok şifreleme algoritmalarında yaygın
olarak kullanılmaktadır. S kutularının kullanılması şifreleme algoritmasını daha güçlü hale …
olarak kullanılmaktadır. S kutularının kullanılması şifreleme algoritmasını daha güçlü hale …
利用Lorenz 混沌系统实现红外图像加密的方案
王聪丽, 陈志斌, 葛勇 - 计算机应用, 2015 - joca.cn
为保证红外成像系统中红外图像的信息安全, 克服采用传统图像加密时方法安全性不高,
实时性差的缺陷, 在分析红外图像比特为平面特征的基础上, 提出了利用Lorenz …
实时性差的缺陷, 在分析红外图像比特为平面特征的基础上, 提出了利用Lorenz …