An enhanced logistic chaotic map based tweakable speech encryption algorithm
This work aims to improves the chaotic behavior of classical logistic chaotic system for voice
encryption. In this study, the classical chaotic system was enhanced. This enhanced map …
encryption. In this study, the classical chaotic system was enhanced. This enhanced map …
Colour image encryption based on an improved fractional-order logistic map
In this work, we use an improved fractional-order logistic map to introduce a new colour
image encryption algorithm. By analysing the Lyapunov exponent and the bifurcation …
image encryption algorithm. By analysing the Lyapunov exponent and the bifurcation …
Using a DNA tape as a key for encrypt images
MAF Al-Husainy, HA Al-Sewadi… - … Journal of Electronic …, 2022 - inderscienceonline.com
Security of sensitive information, such as medical, financial, and national security records,
whether in transmission or storage are of high concern nowadays. Due to the unique feature …
whether in transmission or storage are of high concern nowadays. Due to the unique feature …
A New Encryption Approach For Color Image Using 3D Fractional Order Chaotic System
With the fast evolution of communication networks, it has become essential to protect images
while they are being transmitted over these networks. This work introduces a method for …
while they are being transmitted over these networks. This work introduces a method for …
Color image encryption based on Fractional-order logistic map
In this paper, we present a new image encryption approach by generating the key streams
using the fractional-order logistics map, which is due to the advantages it offers such as …
using the fractional-order logistics map, which is due to the advantages it offers such as …
[PDF][PDF] A New Medical Image Encryption Using Enhanced Chaotic System.
A Herbadji - ﻛـﻧوـﻟ وـﺟــﯾ ـــﺎ - researchgate.net
The remarkable progress in image processing and telecommunications has necessitated
the protection of the transmitted image from hackers. In this work, we will present a new …
the protection of the transmitted image from hackers. In this work, we will present a new …
[PDF][PDF] ﺔﻌﻣﺎﺟ 20 توأ 1955 ةدﮐﯾﮐﺳ
H Djamel - 1955 - researchgate.net
The transmission of digital information requires great secrecy especially for digital images.
The use of conventional encryption algorithms such as Rivest-Shamir-Adleman, advanced …
The use of conventional encryption algorithms such as Rivest-Shamir-Adleman, advanced …