Performance comparison of Linear Congruent method and Fisher-Yates Shuffle for data randomization

FP Juniawan, HA Pradana… - Journal of Physics …, 2019 - iopscience.iop.org
Abstract Linear Congruent Method (LCM) and Fisher-Yates Shuffle Algorithms are widely
known and used in various fields and needs. Both of these algorithms are used because of …

BlackJack: Secure machine learning on IoT devices through hardware-based shuffling

K Ganesan, M Fishkin, O Lin, NE Jerger - arXiv preprint arXiv:2310.17804, 2023 - arxiv.org
Neural networks are seeing increased use in diverse Internet of Things (IoT) applications
such as healthcare, smart homes and industrial monitoring. Their widespread use makes …

A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling

P Cao, L Teng - Nonlinear Dynamics, 2024 - Springer
This paper introduces a new one-dimensional chaotic system, which can be considered as
an improvement upon the Bernoulli map. The Quadratic Bernoulli Chaotic System (QBCS) is …

Hybrid image crypto system for secure image communication–A VLSI approach

B Ramalingam, A Rengarajan… - Microprocessors and …, 2017 - Elsevier
This work presents permutation and diffusion based hybrid image crypto system in transform
domain using combined chaotic maps and Haar Integer Wavelet Transform (HIWT). HIWT is …

Fisher-Yates chaotic shuffling based visual cryptography scheme for multimodal biometric authentication

M Gayathri, C Malathy - Wireless Personal Communications, 2022 - Springer
In the existing multimodal biometric authentication technique, there is no integrity in the
biometric information, and authentication of end users is also not very secured. In this paper …

A novel dual purpose spatial domain algorithm for digital image watermarking and cryptography using Extended Hamming Code

S Ghosh, S De, SP Maity… - 2015 2nd International …, 2015 - ieeexplore.ieee.org
The tremendous growth of internet in the recent years has made possible easier copying,
manipulation and redistribution of digital media. As a result, the problem of security and …

The creation of maze in order to hide data, and the proposal of method based on AES data encryption algorithm

E Güvenoğlu, C Razbonyalı - El-Cezeri, 2019 - dergipark.org.tr
The field of science, which enables the transmission of private data in multimedia
environments such as display, audio and video, is called steganography. The widespread …

Secure Medical Image Transmission Using 2‐D Tent Cascade Logistic Map

LR Jonisha Miriam, A Lenin Fred… - … Data Engineering for …, 2024 - Wiley Online Library
Secure image communication is becoming more and more important owing to stealing and
content manipulation. To protect the confidential image from unauthorized access …

Resim şifreleme amacıyla dinamik S kutusu tasarımı için bir yöntem

E Güvenoğlu - El-Cezeri, 2016 - dergipark.org.tr
Yer değiştirme kutuları (Substitution Box, s-box) blok şifreleme algoritmalarında yaygın
olarak kullanılmaktadır. S kutularının kullanılması şifreleme algoritmasını daha güçlü hale …

利用Lorenz 混沌系统实现红外图像加密的方案

王聪丽, 陈志斌, 葛勇 - 计算机应用, 2015 - joca.cn
为保证红外成像系统中红外图像的信息安全, 克服采用传统图像加密时方法安全性不高,
实时性差的缺陷, 在分析红外图像比特为平面特征的基础上, 提出了利用Lorenz …