On the dynamical degradation of digital piecewise linear chaotic maps
When chaotic systems are realized with finite precisions in digital computers, their dynamical
properties are often found to be entirely different from the original versions in the continuous …
properties are often found to be entirely different from the original versions in the continuous …
A secret key cryptosystem by iterating a chaotic map
Chaos is introduced to cryptology. As an example of the applications, a secret key
cryptosystem by iterating a one dimensional chaotic map is proposed. This system is based …
cryptosystem by iterating a one dimensional chaotic map is proposed. This system is based …
Pseudonoise sequences by chaotic nonlinear maps and their correlation properties
T Kohda, A Tsuneda - IEICE Transactions on Communications, 1993 - search.ieice.org
A simple method is given for obtaining new families of pseudonoise (PN) sequences based
on chaotic non-linear maps. Such families are worse than the Gold and the Kasami families …
on chaotic non-linear maps. Such families are worse than the Gold and the Kasami families …
[PDF][PDF] Analyses and new designs of digital chaotic ciphers
S Li - Ph. D. Dissertation, 2003 - researchgate.net
Since 1980s, the idea of using digital chaotic systems to design new ciphers has attracted
more and more attention. The use of chaos in cryptography depends on the natural relation …
more and more attention. The use of chaos in cryptography depends on the natural relation …
A literature review on image encryption techniques
S Geetha, P Punithavathi, AM Infanteena… - International Journal of …, 2018 - igi-global.com
Encryption is one of the techniques that ensure the security of images used in various
domains like military intelligence, secure medical imaging services, intranet and internet …
domains like military intelligence, secure medical imaging services, intranet and internet …
A new audio encryption algorithm based on chaotic block cipher
EA Albahrani - 2017 Annual Conference on New Trends in …, 2017 - ieeexplore.ieee.org
In this paper, new encryption algorithm for audio file is proposed based on a combination
between block cipher and chaotic maps. The proposed algorithm encrypts and decrypts a …
between block cipher and chaotic maps. The proposed algorithm encrypts and decrypts a …
Introduction to chaos-based communications and signal processing
CP Silva, AM Young - 2000 IEEE Aerospace Conference …, 2000 - ieeexplore.ieee.org
The evolution of the new discipline of nonlinear engineering is taking place along two fronts:
the first addressing higher-order effects that have become more important in current designs …
the first addressing higher-order effects that have become more important in current designs …
Joint block and stream cipher based on a modified skew tent map
R Qumsieh, M Farajallah, R Hamamreh - Multimedia Tools and …, 2019 - Springer
Image encryption is very different from that of texts due to the bulk data capacity and the high
redundancy of images. Thus, traditional methods are difficult to use for image encryption as …
redundancy of images. Thus, traditional methods are difficult to use for image encryption as …
A proficient chaos based security algorithm for emergency response in WBAN system
E-healthcare is emerging as a new technology for monitoring vital body parameters of
patient having chronic disease or during disaster. Wireless Body Area Network (WBAN) is …
patient having chronic disease or during disaster. Wireless Body Area Network (WBAN) is …