An enhanced logistic chaotic map based tweakable speech encryption algorithm

D Herbadji, A Herbadji, H Kahia, A Belmeguenai… - Integration, 2024 - Elsevier
This work aims to improves the chaotic behavior of classical logistic chaotic system for voice
encryption. In this study, the classical chaotic system was enhanced. This enhanced map …

Colour image encryption based on an improved fractional-order logistic map

I Haddad, D Herbadji, A Belmeguenai… - … journal of electronic …, 2023 - inderscienceonline.com
In this work, we use an improved fractional-order logistic map to introduce a new colour
image encryption algorithm. By analysing the Lyapunov exponent and the bifurcation …

Using a DNA tape as a key for encrypt images

MAF Al-Husainy, HA Al-Sewadi… - … Journal of Electronic …, 2022 - inderscienceonline.com
Security of sensitive information, such as medical, financial, and national security records,
whether in transmission or storage are of high concern nowadays. Due to the unique feature …

A New Encryption Approach For Color Image Using 3D Fractional Order Chaotic System

I Haddad, A Belmeguenai, D Herbadji… - 2022 IEEE 21st …, 2022 - ieeexplore.ieee.org
With the fast evolution of communication networks, it has become essential to protect images
while they are being transmitted over these networks. This work introduces a method for …

Color image encryption based on Fractional-order logistic map

I Haddad, A Belmeguenai, D Herbadji… - … on Image and …, 2022 - ieeexplore.ieee.org
In this paper, we present a new image encryption approach by generating the key streams
using the fractional-order logistics map, which is due to the advantages it offers such as …

[PDF][PDF] A New Medical Image Encryption Using Enhanced Chaotic System.

A Herbadji - ﻛـﻧوـﻟ وـﺟــﯾ ـــﺎ‎ - researchgate.net
The remarkable progress in image processing and telecommunications has necessitated
the protection of the transmitted image from hackers. In this work, we will present a new …

[PDF][PDF] ﺔﻌﻣﺎﺟ 20 توأ 1955 ةدﮐﯾﮐﺳ

H Djamel - 1955 - researchgate.net
The transmission of digital information requires great secrecy especially for digital images.
The use of conventional encryption algorithms such as Rivest-Shamir-Adleman, advanced …