Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap
B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …
cryptography. Specifically, numerous research works have been focusing on chaotic image …
Design of hyperchaotic system based on multi-scroll and its encryption algorithm in color image
S Yan, L Li, B Gu, Y Cui, J Wang, J Song - Integration, 2023 - Elsevier
Chaotic systems are suitable for image encryption due to their numerous intrinsic properties.
However, the low-dimensional chaotic systems used in many existing chaos-based image …
However, the low-dimensional chaotic systems used in many existing chaos-based image …
Bifurcation and chaos in a smooth 3D dynamical system extended from Nosé-Hoover oscillator
The chaotic system with complicated dynamical behaviors has high potential in practical
applications. This paper reports a simple smooth 3D dynamical system that is derived from …
applications. This paper reports a simple smooth 3D dynamical system that is derived from …
Privacy protection for 3D point cloud classification based on an optical chaotic encryption scheme
B Liu, Y Liu, Y Xie, X Jiang, Y Ye, T Song, J Chai… - Optics …, 2023 - opg.optica.org
In allusion to the privacy and security problems in 3D point cloud classification, a novel
privacy protection method for 3D point cloud classification based on optical chaotic …
privacy protection method for 3D point cloud classification based on optical chaotic …
Blockchain data secure transmission method based on homomorphic encryption
S Peng, Z Cai, W Liu, W Wang, G Li… - Computational …, 2022 - Wiley Online Library
To ensure the security of data transmission and recording in Internet environment monitoring
systems, this paper proposes a study of a secure method of blockchain data transfer based …
systems, this paper proposes a study of a secure method of blockchain data transfer based …
Design of a simple and low cost chaotic signal generation circuit for UWB applications
R Fellah, MS Azzaz, C Tanougast, R Kaibou - The European Physical …, 2021 - Springer
Ultra-wideband (UWB) is a very promising technology in several applications, where low-
power consumption, low complexity, and low-cost constraints are strongly required …
power consumption, low complexity, and low-cost constraints are strongly required …
Effects of Photon Recycling and Luminescent Coupling in All‐Perovskite Tandem Solar Cells Assessed by Full Opto‐electronic Simulation
The impact of photon recycling (PR) and of luminescent coupling (LC) on the photovoltaic
performance of all‐perovskite tandem solar cells is analyzed by the means of optical and full …
performance of all‐perovskite tandem solar cells is analyzed by the means of optical and full …
A Deterministic Chaos-Model-Based Gaussian Noise Generator
The abilities of quantitative description of noise are restricted due to its origin, and only
statistical and spectral analysis methods can be applied, while an exact time evolution …
statistical and spectral analysis methods can be applied, while an exact time evolution …
Implementation of embedded unspecific continuous English speech recognition based on HMM
X Lu, MA Shah - Recent Advances in Electrical & Electronic …, 2021 - ingentaconnect.com
Background: To improve the usage of computers, a very important role is played by the
Human-computer interaction through Natural Language Conversational Interfaces. Speech …
Human-computer interaction through Natural Language Conversational Interfaces. Speech …
A novel image shift encryption algorithm based on the dynamic Joseph ring problem
H Wang, B Dong, H Ke, Q Qi, G Liu - Multimedia Tools and Applications, 2023 - Springer
Image encryption can effectively prevent unauthorized users from stealing personal
information. Attackers usually analyze the information of the encrypted image according to …
information. Attackers usually analyze the information of the encrypted image according to …