[HTML][HTML] Chaos-based cryptography: Text encryption using image algorithms
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular
stream-encryption algorithms, eg, textual data, are now rarely considered. This article …
stream-encryption algorithms, eg, textual data, are now rarely considered. This article …
[HTML][HTML] An efficient image encryption algorithm based on S-box and DNA code
J Zhang, J Guo, D Lu - Measurement: Sensors, 2023 - Elsevier
In order to ensure the security of image information transmission, a new image encryption
algorithm is proposed based on S-box and DNA coding theory. Through the construction of …
algorithm is proposed based on S-box and DNA coding theory. Through the construction of …
[HTML][HTML] Research on a double image security transmission algorithm of image encryption and hiding
J Shang, X Xu - Measurement: Sensors, 2024 - Elsevier
Image encryption is an important research field. In some application scenarios, only
encrypting can actually attract the attention of attackers. Therefore, this article provides dual …
encrypting can actually attract the attention of attackers. Therefore, this article provides dual …
Text encryption algorithm for secure communication
K Kordov - International Journal of Applied Mathematics, 2021 - diogenes.bg
In this paper, a new encryption algorithm is presented, designed for secure text message
communication. The proposed cryptographic system is based on pseudorandom generator …
communication. The proposed cryptographic system is based on pseudorandom generator …
Text encryption approach using DNA computation and hyperchaotic system
S OleiwiTuama, SA Kadum… - 2021 2nd Information …, 2021 - ieeexplore.ieee.org
“Security” has formed into a critical concern in the digital data storage and transfer via
communication that is not secure channels, which can be addressed by employing trusted …
communication that is not secure channels, which can be addressed by employing trusted …
Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA
ZN Al-Kateeb, M Jader - Multimedia Tools and Applications, 2024 - Springer
Securing confidential data is imperative in the modern digital era, where the escalating
challenges in data security underscore the urgency to provide a secure and efficient …
challenges in data security underscore the urgency to provide a secure and efficient …
Highly secured and quickest image encryption algorithm based on trigonometric chaotic map and S-box
The purpose of this research is to develop a highly secured non-breakable fastest
cryptosystem. A significant number of image encryption plans have been proposed during …
cryptosystem. A significant number of image encryption plans have been proposed during …
Credentials Protection Using QKD Scheme and the Input Data for Login Applications
R Sumathi, NR Raajan, R Amirtharajan - Journal of The Institution of …, 2024 - Springer
The heavy usage of IoT applications demands the security of the credentials used to access
the same. Connecting devices using the Internet has made it possible to execute …
the same. Connecting devices using the Internet has made it possible to execute …
[PDF][PDF] Encrypting of text based on chaotic map
Background: Due to the internet's recent rapid expansion, security has become a crucial
issue when transmitting digital data via unsecure channels. This can be applied by …
issue when transmitting digital data via unsecure channels. This can be applied by …
[PDF][PDF] Image encryption using trigonometric chaotic map
F Abu-Amara - Journal of Advanced Research in Dynamical and …, 2018 - researchgate.net
Chaotic maps hold attractive properties such as high sensitivity to a small change in initial
value and control parameters, pseudorandom, instability of system orbit, and ease of …
value and control parameters, pseudorandom, instability of system orbit, and ease of …