A novel memristive 6D hyperchaotic autonomous system with hidden extreme multistability
BA Mezatio, MT Motchongom, BRW Tekam… - Chaos, Solitons & …, 2019 - Elsevier
This paper presents a 6D autonomous system, obtained by introducing a flux-controlled
memristor model into an existing 5D hyperchaotic autonomous system. The dynamics of the …
memristor model into an existing 5D hyperchaotic autonomous system. The dynamics of the …
[HTML][HTML] Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA)
This paper proposes an innovative image cryptosystem algorithm using the properties of the
block encryption, 4D logistic map and DNA systems. Multiple key sequences are generated …
block encryption, 4D logistic map and DNA systems. Multiple key sequences are generated …
Increasing the security of transmitted text messages using chaotic key and image key cryptography
It is critical to safeguard confidential data, especially secret and private messages. This
study introduces a novel data cryptography approach. The new approach will be capable of …
study introduces a novel data cryptography approach. The new approach will be capable of …
[PDF][PDF] An approach for enhancing data confidentiality in hadoop
The quantity of prepared and stored data in the cloud is rising dramatically. The common
storage devices at both hardware and software levels cannot satisfy the necessity of the …
storage devices at both hardware and software levels cannot satisfy the necessity of the …
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
Hadoop has become a promising platform to reliably process and store big data. It provides
flexible and low cost services to huge data through Hadoop Distributed File System (HDFS) …
flexible and low cost services to huge data through Hadoop Distributed File System (HDFS) …
Joint image compression and encryption using a novel column-wise scanning and optimization algorithm
In this research, a joint image compression and encryption scheme is presented which
works for different image dimensions 256X256, 512X512 and 1024X1024 and different …
works for different image dimensions 256X256, 512X512 and 1024X1024 and different …
An efficient construction of key-dependent substitution box based on chaotic sine map
A substitution box is a core component of the popular symmetric-key algorithms. However,
the major problem of the conventional substitution boxes is the statistic behavior, which is …
the major problem of the conventional substitution boxes is the statistic behavior, which is …
[PDF][PDF] Enhancing approach using hybrid pailler and RSA for information security in bigdata
SMJ Abdalwahid, RZ Yousif… - Applied Computer …, 2019 - bibliotekanauki.pl
The amount of data processed and stored in the cloud is growing dramatically. The
traditional storage devices at both hardware and software levels cannot meet the …
traditional storage devices at both hardware and software levels cannot meet the …
Enhancing approach for information security in hadoop
Abstract polytechnicDeveloping a confident Hadoop essentially a cloud computing is an
essential challenge as the cloud. The protection policy can be utilized during various cloud …
essential challenge as the cloud. The protection policy can be utilized during various cloud …
[HTML][HTML] Complex dynamics from a novel memristive 6D hyperchaotic autonomous system
BA Mezatio, M Motchongom Tingue, R Kengne… - International Journal of …, 2020 - Springer
A simple 5D hyperchaotic system recently introduced in the literature is modified by using a
charge-controlled memristor model and striking behaviors are uncovered. The resulting …
charge-controlled memristor model and striking behaviors are uncovered. The resulting …