[PDF][PDF] A proposal video encryption using light stream algorithm
AR Alawi, NF Hassan - Engineering and Technology Journal, 2021 - iasj.net
The need for protecting the secret information from the un-authorized users has been led to
applying a lot of encryption approaches. However, there is high importance in ciphering the …
applying a lot of encryption approaches. However, there is high importance in ciphering the …
[PDF][PDF] Enhanced cryptographic algorithm based on chaotic map and wavelet packets
C Macovei, AE Lupu, M Răducanu - UPB Sci. Bull., Series C, 2020 - scientificbulletin.upb.ro
This paper presents an enhanced version of an existing encryption algorithm by combining
wavelets and chaos theory concepts. The novelty consists in replacing the simple …
wavelets and chaos theory concepts. The novelty consists in replacing the simple …
[PDF][PDF] Speech encryption based on zaslavsky map
SF Yousif - Journal of Engineering and Applied Sciences, 2019 - researchgate.net
In information transmission such as speech information, higher security and confidentiality
are especially required. Therefore, data encryption is pre-requisite for secure …
are especially required. Therefore, data encryption is pre-requisite for secure …
[PDF][PDF] A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm
Text encryption in video is a vital tool in many industries where protecting sensitive
information is of highest concern. Algorithms and automated detection methods commonly …
information is of highest concern. Algorithms and automated detection methods commonly …
[PDF][PDF] A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm (Keccak)
YA Ghareeb, EK Gbashi - IRAQI JOURNAL OF COMPUTERS …, 2022 - iasj.net
Cryptography is a security strategy that prevents disclosure of the information while it is
transit, in storage, or both. There are a variety of methods for maintaining data security …
transit, in storage, or both. There are a variety of methods for maintaining data security …
Hybrid Cryptosystem Using Quasi Group and Chaotic Maps Applied on 1D Data
HA Abughali, MA Mikki - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
In this paper cryptosystem algorithm is proposed, this cryptosystem has a symmetric key,
designed using both chaotic maps and quasigroup algorithms. The designed cryptosystem …
designed using both chaotic maps and quasigroup algorithms. The designed cryptosystem …
[PDF][PDF] Improvement Pseudo-Random Bit Generator Based on Hybrid Chaotic 1D Logistic Maps and 2D Hénon system
A pseudo-random number generator (PRNG) or pseudo-random bit generator (PRBG) is a
program created a sequence of numbers that can mimic sequences of random numbers …
program created a sequence of numbers that can mimic sequences of random numbers …