[HTML][HTML] Chaos-based cryptography: Text encryption using image algorithms

M Lawnik, L Moysis, C Volos - Electronics, 2022 - mdpi.com
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular
stream-encryption algorithms, eg, textual data, are now rarely considered. This article …

[HTML][HTML] An efficient image encryption algorithm based on S-box and DNA code

J Zhang, J Guo, D Lu - Measurement: Sensors, 2023 - Elsevier
In order to ensure the security of image information transmission, a new image encryption
algorithm is proposed based on S-box and DNA coding theory. Through the construction of …

[HTML][HTML] Research on a double image security transmission algorithm of image encryption and hiding

J Shang, X Xu - Measurement: Sensors, 2024 - Elsevier
Image encryption is an important research field. In some application scenarios, only
encrypting can actually attract the attention of attackers. Therefore, this article provides dual …

Text encryption algorithm for secure communication

K Kordov - International Journal of Applied Mathematics, 2021 - diogenes.bg
In this paper, a new encryption algorithm is presented, designed for secure text message
communication. The proposed cryptographic system is based on pseudorandom generator …

Text encryption approach using DNA computation and hyperchaotic system

S OleiwiTuama, SA Kadum… - 2021 2nd Information …, 2021 - ieeexplore.ieee.org
“Security” has formed into a critical concern in the digital data storage and transfer via
communication that is not secure channels, which can be addressed by employing trusted …

Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA

ZN Al-Kateeb, M Jader - Multimedia Tools and Applications, 2024 - Springer
Securing confidential data is imperative in the modern digital era, where the escalating
challenges in data security underscore the urgency to provide a secure and efficient …

Highly secured and quickest image encryption algorithm based on trigonometric chaotic map and S-box

R Chinram, M Bano, U Habib, P Singavananda - Soft Computing, 2023 - Springer
The purpose of this research is to develop a highly secured non-breakable fastest
cryptosystem. A significant number of image encryption plans have been proposed during …

Credentials Protection Using QKD Scheme and the Input Data for Login Applications

R Sumathi, NR Raajan, R Amirtharajan - Journal of The Institution of …, 2024 - Springer
The heavy usage of IoT applications demands the security of the credentials used to access
the same. Connecting devices using the Internet has made it possible to execute …

[PDF][PDF] Encrypting of text based on chaotic map

HT Mangi, SA Ali, MJ Jawad - Journal of University of Babylon for Pure and …, 2023 - iasj.net
Background: Due to the internet's recent rapid expansion, security has become a crucial
issue when transmitting digital data via unsecure channels. This can be applied by …

[PDF][PDF] Image encryption using trigonometric chaotic map

F Abu-Amara - Journal of Advanced Research in Dynamical and …, 2018 - researchgate.net
Chaotic maps hold attractive properties such as high sensitivity to a small change in initial
value and control parameters, pseudorandom, instability of system orbit, and ease of …