A chaos-based image encryption technique utilizing Hilbert curves and H-fractals

X Zhang, L Wang, Z Zhou, Y Niu - IEEE Access, 2019 - ieeexplore.ieee.org
Image encryption is the most direct and effective technical means for protecting the security
of image information. Based on the space filling property of the Hilbert curve and the infinite …

A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic

M Luis, L Daniel, A Isabel, A Deicy - Multimedia Tools and Applications, 2023 - Springer
Based on the combination of quaternion numbers, residual matrices, and chaotic attractors,
a new cryptosystem is proposed for multimedia processing files such as images and audio …

Secure quaternion feistel cipher for DICOM images

M Dzwonkowski, R Rykaczewski - IEEE Transactions on Image …, 2018 - ieeexplore.ieee.org
An improved and extended version of a quaternion-based lossless encryption technique for
digital image and communication on medicine (DICOM) images is proposed. We highlight …

A digital image steganography using sierpinski gasket fractal and PLSB

C Rupa - Journal of The Institution of Engineers (India): Series B, 2013 - Springer
Abstract Information attacks are caused due to the weaknesses in the information security.
These attacks affect the non-repudiation and integrity of the security services. In this paper, a …

An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding

G Iovane, A Amorosia, E Benedetto… - Journal of Discrete …, 2015 - Taylor & Francis
In the present paper we will show a system to realize an innovative cryptographic code that
ensures a high level of security using Information Fusion (IF) techniques. In detail, we have …

A VOHE system for underwater communications

Y Peng, T Nagase, S You, T Kanamoto - Electronics, 2020 - mdpi.com
This paper presents a new method for encrypting holographic information based on optical
and acoustic signals called a Virtual Optical Holographic Encryption (VOHE) system for …

Digital fingerprinting for color images based on the quaternion encryption scheme

B Czaplewski, M Dzwonkowski… - Pattern Recognition Letters, 2014 - Elsevier
In this paper we present a new quaternion-based encryption technique for color images. In
the proposed encryption method, images are written as quaternions and are rotated in a …

[PDF][PDF] Multiplicative complexity and solving generalized brent equations with SAT solvers

NT Courtois, D Hulme, T Mourouzis - COMPUTATION TOOLS, 2012 - personales.upv.es
In this paper we look at the general problem of Multiplicative Complexity (MC) as an
essential tool for optimizing potentially arbitrary algebraic computations over fields and rings …

[PDF][PDF] Online multi-parameter 3D signature verification through curve fitting

PMR Anand, G Bajpai, V Bhaskar - International Journal of Computer …, 2009 - academia.edu
Biometric based personal identification is a reliable and widely accepted method for
authentication. Human 3D signature is distinct from other biometric authentication methods …

Symmetric Encryption Using Sierpinski Fractal Geometry

P Jhansi Rani, S Durga Bhavani - … , ICIP 2011, Bangalore, India, August 5 …, 2011 - Springer
Symmetric cryptography uses the same secret key for encryption and decryption. A desirable
property of symmetric encryption is termed as avalanche effect by which two different keys …