An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks
X Li, L Zhou, F Tan - Soft Computing, 2022 - Springer
In order to improve the security of image information in the information age, we propose an
image encryption scheme in this paper, which is achieved by using finite-time cluster …
image encryption scheme in this paper, which is achieved by using finite-time cluster …
[HTML][HTML] BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing
Cloud computing facilitates the storage and management of huge volumes of data. It offers
flexibility for retrieving the data anytime and anywhere. In recent years, storing data onto the …
flexibility for retrieving the data anytime and anywhere. In recent years, storing data onto the …
Increasing the security of transmitted text messages using chaotic key and image key cryptography
It is critical to safeguard confidential data, especially secret and private messages. This
study introduces a novel data cryptography approach. The new approach will be capable of …
study introduces a novel data cryptography approach. The new approach will be capable of …
An encryption scheme based on synchronization of two-layered complex dynamical networks
A novel encryption scheme based on complex chaotic networks is proposed in this paper.
Compared with a single chaotic system, a network of chaotic systems possesses complex …
Compared with a single chaotic system, a network of chaotic systems possesses complex …
Image encryption scheme using chaos and simulated annealing algorithm
X Wang, C Liu, D Xu, C Liu - Nonlinear Dynamics, 2016 - Springer
In this paper, we proposed a novel image encryption scheme based on chaos and simulated
annealing algorithm. The proposed algorithm considers the generation of random sequence …
annealing algorithm. The proposed algorithm considers the generation of random sequence …
A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization
L Zhou, X Li, F Tan, Y Huang, W Ma - Soft Computing, 2022 - Springer
In this paper, an audio encryption/decryption scheme based on the cluster synchronization
of two-layer complex networks within fixed-time is proposed. The two-layer network model …
of two-layer complex networks within fixed-time is proposed. The two-layer network model …
Synchronization of a memristor chaotic system and image encryption
In this paper, a sliding-mode-based controller is designed for finite-time synchronization of
Memristor Chaotic Systems (MCSs). It demonstrates that the synchronization errors of the …
Memristor Chaotic Systems (MCSs). It demonstrates that the synchronization errors of the …
K-RSA: Secure data storage technique for multimedia in cloud data server
Cloud has become one of the most demanding services for data storage. On another hand,
the security of data is one of the challenging tasks for Cloud Service Provider (CSP) …
the security of data is one of the challenging tasks for Cloud Service Provider (CSP) …
Optimised KYC blockchain system
Know your customer or simply KYC is the process of validating and verifying the identity of
its users and examining potential risks of illegal intentions for the business relationship. A …
its users and examining potential risks of illegal intentions for the business relationship. A …
Polygon Boolean operations and physical unclonable functions implemented by an Ag-embedded sodium-alginate-based memristor for image encryption/decryption
J Shi, J Han, J Bian, Y Dong, Y Lin, Y Zhang… - Applied Physics …, 2024 - pubs.aip.org
In this work, we demonstrate the coexistence of nonvolatile memory (NVM) and volatile
threshold switching (VTS) behaviors in an Ag-embedded sodium-alginate-based memristor …
threshold switching (VTS) behaviors in an Ag-embedded sodium-alginate-based memristor …