Image encryption using a novel hybrid chaotic map and dynamic permutation− diffusion
In last few years, chaotic maps are being used extensively by the researchers to build image
cryptosystems. This paper proposes a novel Hybrid chaotic map, and discusses the …
cryptosystems. This paper proposes a novel Hybrid chaotic map, and discusses the …
[HTML][HTML] Quantum-enhanced chaotic image encryption: Strengthening digital data security with 1-D sine-based chaotic maps and quantum coding
MU Rehman - Journal of King Saud University-Computer and …, 2024 - Elsevier
The proposed work delves into the utilization of chaotic maps along with the quantum
mechanisms to strengthen the security of the digital images along with addressing the …
mechanisms to strengthen the security of the digital images along with addressing the …
Novel Duffing chaotic oscillator and its application to privacy data protection
Abstract Traditional Compressive Sensing (CS) achieves both compression and encryption
of digital data. However, most existing compressive sensing methods present some …
of digital data. However, most existing compressive sensing methods present some …
[HTML][HTML] GLOBE: A novel pruning-based sparse modeling with application to time series data representation
AN Omara, AS Alotaibi - Journal of King Saud University-Computer and …, 2023 - Elsevier
In the past years, Sparse Modeling (SM) has been used in a variety of applications, such as
data representation. In this type of data modeling, the data is divided into small segments …
data representation. In this type of data modeling, the data is divided into small segments …
Optical voice hiding based on chaotic fingerprint phase mask and phase-shifting digital holography
Most of the current optical information hiding methods are designed for protecting grayscale
or color images. However, as an important information communication medium, the security …
or color images. However, as an important information communication medium, the security …
An efficient and secure opto-cryptosystem for color medical images using 2D-SICM based fractional fourier transform
R Chang, X Feng, Z Zhang, H Zhang - Multimedia Tools and Applications, 2023 - Springer
Medical images contain sensitive information and are prone to various attacks during
network transmission. Therefore, it is essential to develop a robust algorithm to ensure the …
network transmission. Therefore, it is essential to develop a robust algorithm to ensure the …
Optical single-channel color image encryption based on chaotic palmprint phase masks
This paper presents an optical single-channel color image encryption scheme based on
chaotic palmprint phase masks (CPPM) and Fresnel transform (FrT). The proposed method …
chaotic palmprint phase masks (CPPM) and Fresnel transform (FrT). The proposed method …
Nonlinear image encryption based on phase truncation and phase retrieval operation
G Verma - Journal of Optics, 2023 - Springer
In this paper, a nonlinear optical image encryption scheme using a phase retrieval algorithm
(PRA) and phase-truncated Fourier transform (PTFT) is proposed. In the scheme, the …
(PRA) and phase-truncated Fourier transform (PTFT) is proposed. In the scheme, the …
Weighted Convolution for Quaternion Linear Canonical Cosine Transform and Its Application
R Wang, Q Feng - Axioms, 2024 - mdpi.com
Convolution plays a pivotal role in the domains of signal processing and optics. This paper
primarily focuses on studying the weighted convolution for quaternion linear canonical …
primarily focuses on studying the weighted convolution for quaternion linear canonical …
Optical voice encryption based on speckle-illuminated fourier ptychography and plaintext-related chaotic random phase mask
In this paper, we propose an optical voice encryption scheme based on speckle-illuminated
Fourier ptychography (FP) and plaintext-related chaotic random phase mask (CRPM). In this …
Fourier ptychography (FP) and plaintext-related chaotic random phase mask (CRPM). In this …