Reveal the correlation between randomness and Lyapunov exponent of n-dimensional non-degenerate hyper chaotic map

R Liu, H Liu, M Zhao - Integration, 2023 - Elsevier
In this paper, we investigate the correlation between the Lyapunov exponent (LE) and the
randomness in chaotic maps. The recently constructed chaotic map has certain limitations …

An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations

DRIM Setiadi, N Rijati - Computation, 2023 - mdpi.com
Confusion, diffusion, and encryption keys affect the quality of image encryption. This
research proposes combining bit-and pixel-level permutation and substitution methods …

A systematic review of innovations for real-time image security in IoT applications using machine learning and blockchain

M Rai, S Kumar, PS Rathore - Journal of Intelligent Manufacturing, 2024 - Springer
Image security in the context of Internet of Things (IoT) has gained significant attention due
to the increasing demand for timely and effective protection against unauthorized access …

A multiple-medical-image encryption method based on SHA-256 and DNA Encoding

J Wu, J Zhang, D Liu, X Wang - Entropy, 2023 - mdpi.com
Ensuring the privacy and secrecy of digital medical images has become a pressing issue as
a result of the quick development of smart medical technology and the exponential growth in …

[HTML][HTML] Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission

JR Cárdenas-Valdez, R Ramírez-Villalobos… - Entropy, 2024 - mdpi.com
Protecting sensitive patient data, such as electrocardiogram (ECG) signals, during RF
wireless transmission is essential due to the increasing demand for secure telemedicine …

Comparison of two new chaos-based pseudorandom number generators implemented in microcontroller

D Murillo-Escobar, K Vega-Pérez, MA Murillo-Escobar… - Integration, 2024 - Elsevier
Chaos-based encryption algorithms uses a pseudorandom number generator (PRNG) to
generate chaotic dynamics to carry out the processes to encrypt different types of …

Chaos based speech encryption using microcontroller

N Charalampidis, A Iatropoulos, C Volos - Integration, 2024 - Elsevier
In this work a real-time chaos-based speech encryption scheme designed for low-cost
microcontroller implementation is presented. The method involves a two-step encryption …

An efficient and compromise-resilient image encryption scheme for resource-constrained environments

AN Khan, A Mehmood, MNM Bhutta, IA Khan, AR Khan - Plos one, 2024 - journals.plos.org
The secret keys produced by current image cryptosystems, which rely on chaotic sequences,
exhibit a direct correlation with the size of the image. As the image dimensions expand, the …

Inverse Proportional Chaotification Model for Image Encryption in IoT Scenarios

W Liu, K Sun, H Wang, B Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In Internet of Things (IoT) scenarios, the limited computing resources and energy constraints
of devices, alongside the growing demand for real-time applications, make secure image …

Color image encryption based on discrete memristor logistic map and DNA encoding

C Wang, Z Chong, H Zhang, P Ma, W Dong - Integration, 2024 - Elsevier
This paper proposes a color image encryption scheme with new features based on two-
dimensional discrete memristor logistic map (2D-MLM), Deoxyribonucleic acid (DNA) …