A novel memristive 6D hyperchaotic autonomous system with hidden extreme multistability

BA Mezatio, MT Motchongom, BRW Tekam… - Chaos, Solitons & …, 2019 - Elsevier
This paper presents a 6D autonomous system, obtained by introducing a flux-controlled
memristor model into an existing 5D hyperchaotic autonomous system. The dynamics of the …

[HTML][HTML] Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA)

S Stalin, P Maheshwary, PK Shukla… - Journal of medical …, 2019 - Springer
This paper proposes an innovative image cryptosystem algorithm using the properties of the
block encryption, 4D logistic map and DNA systems. Multiple key sequences are generated …

Increasing the security of transmitted text messages using chaotic key and image key cryptography

M Abu-Faraj, A Al-Hyari, I Altaharwa… - … Journal of Data and …, 2023 - growingscience.com
It is critical to safeguard confidential data, especially secret and private messages. This
study introduces a novel data cryptography approach. The new approach will be capable of …

[PDF][PDF] An approach for enhancing data confidentiality in hadoop

SW Kareem, RZ Yousif… - Indonesian Journal of …, 2020 - pdfs.semanticscholar.org
The quantity of prepared and stored data in the cloud is rising dramatically. The common
storage devices at both hardware and software levels cannot satisfy the necessity of the …

Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective

G Kapil, A Agrawal, A Attaallah, A Algarni… - PeerJ Computer …, 2020 - peerj.com
Hadoop has become a promising platform to reliably process and store big data. It provides
flexible and low cost services to huge data through Hadoop Distributed File System (HDFS) …

Joint image compression and encryption using a novel column-wise scanning and optimization algorithm

P Chaudhary, R Gupta, A Singh, P Majumder… - Procedia Computer …, 2020 - Elsevier
In this research, a joint image compression and encryption scheme is presented which
works for different image dimensions 256X256, 512X512 and 1024X1024 and different …

An efficient construction of key-dependent substitution box based on chaotic sine map

M Usama, O Rehman, I Memon… - International Journal of …, 2019 - journals.sagepub.com
A substitution box is a core component of the popular symmetric-key algorithms. However,
the major problem of the conventional substitution boxes is the statistic behavior, which is …

[PDF][PDF] Enhancing approach using hybrid pailler and RSA for information security in bigdata

SMJ Abdalwahid, RZ Yousif… - Applied Computer …, 2019 - bibliotekanauki.pl
The amount of data processed and stored in the cloud is growing dramatically. The
traditional storage devices at both hardware and software levels cannot meet the …

Enhancing approach for information security in hadoop

RZ Yousif, SW Kareem… - Polytechnic …, 2020 - polytechnic-journal.epu.edu.iq
Abstract polytechnicDeveloping a confident Hadoop essentially a cloud computing is an
essential challenge as the cloud. The protection policy can be utilized during various cloud …

[HTML][HTML] Complex dynamics from a novel memristive 6D hyperchaotic autonomous system

BA Mezatio, M Motchongom Tingue, R Kengne… - International Journal of …, 2020 - Springer
A simple 5D hyperchaotic system recently introduced in the literature is modified by using a
charge-controlled memristor model and striking behaviors are uncovered. The resulting …