Filters








287 Hits in 3.4 sec

Color image encryption algorithm based on dynamic chaos and matrix convolution

Xiancheng Hu, Liansuo Wei, Wei Chen, Qiqi Chen, Yuan Guo
2020 IEEE Access  
This paper proposes a color image encryption algorithm based on a cloud model Fibonacci chaotic system, as well as a matrix convolution operation that can protect image content effectively and safely.  ...  INDEX TERMS Cloud model, Fibonacci chaotic system, matrix convolution algorithm, color image, encryption.  ...  In [29] a new encryption scheme based on chaotic mapping combined with Tinkerbell chaotic mapping is presented.  ... 
doi:10.1109/access.2020.2965740 fatcat:qxlgjlopnzagfnrdug66zhy5vy

Image Encryption Algorithm Based on a Novel Wide-Range Discrete Hyperchaotic Map

Huiyan Zhong, Guodong Li, Xiangliang Xu, Xiaoming Song
2022 Mathematics  
Therefore, we propose herein a novel wide-range discrete hyperchaotic map(3D-SCC) based on the mathematical model of the Sine map.  ...  Moreover, this paper proposes an image encryption algorithm based on a dynamic cycle shift scramble algorithm and image-sensitive function.  ...  Motivations and Contributions For image encryption algorithms based on chaotic mapping, the security depends mainly on the chaotic mapping complexity and the algorithm [39] .  ... 
doi:10.3390/math10152583 fatcat:t3tafo5gnjg3pgtsocu3doulsy

A Review of Compressive Sensing in Information Security Field

Yushu Zhang, Leo Yu Zhang, Jiantao Zhou, Licheng Liu, Fei Chen, Xing He
2016 IEEE Access  
Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS.  ...  , which can achieve simultaneous compression and encryption of an image or multiple images.  ...  The authors in [34] developed a simultaneous image encryption and compression scheme based on random convolution and random subsampling.  ... 
doi:10.1109/access.2016.2569421 fatcat:pwi75keuyveajkt2hy2ghsbt2i

Double image encryption algorithm based on neural network and chaos

Zhenlong Man, Jinqing Li, Xiaoqiang Di, Yaohui Sheng, Zefei Liu
2021 Chaos, Solitons & Fractals  
To realize the secure transmission of double images, this paper proposes a double image encryption algorithm based on convolutional neural network (CNN) and dynamic adaptive diffusion.  ...  First, a chaotic map is used to control the initial values of the 5D conservative chaotic system to enhance the security of the key.  ...  These encryption algorithms have a common feature, they are all image encryption schemes based on the chaos [14] [15] [16] , and have been proved to be effective.  ... 
doi:10.1016/j.chaos.2021.111318 fatcat:q3tssd3tc5cbxkfudqirypg4eq

Subject Review: Image Encryption Based on Multi Techniques

Zainab Mohammed Essa, Doaa Mohsin Abd Ali Afraji, Donia Fadhil Chalob, Sahar Hasan Hashim, Ziad M. Abood
2021 International Journal of Engineering Research and Advanced Technology  
Sundry cipherment means have been created to ensure data security, the chaos encryption system being one of the most widely employed in recent years.  ...  As a result, the usage of cipherment and decipherment ways is becoming more popular.  ...  First, use multiple chaos-based circular mapping, using chaos logistic maps, a pair of sub keys is produced.  ... 
doi:10.31695/ijerat.2021.3734 fatcat:rljmmwbg5vgthdtlm7xvxlznde

A New Image Encryption Algorithm Based on Single S-Box and Dynamic Encryption Step

Wang Ji Jun, Tan Soo Fun
2021 IEEE Access  
This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a lowdimensional chaotic system.  ...  Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. However, the high-dimensional continuous chaotic has increased the algorithm's complexity.  ...  Compared to recent hyperchaos [7] - [9] , coupling map lattices with mixed multi-chaos [11] , dynamic chaos and matrix convolution [12] , and generalized Fibonacci chaos [13] , the chaotic logistic  ... 
doi:10.1109/access.2021.3108789 fatcat:vryedqtabrgijgyir7jp6kvlbm

Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap

Behrouz Zolfaghari, Takeshi Koshiba
2022 Applied System Innovation  
A comprehensive survey can highlight existing trends and shed light on less-studied topics in the area of chaotic image encryption.  ...  Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption.  ...  Another example is a color image encryption scheme based on a hybrid hyper-chaotic system and cellular automata analyzed by Li et al. [164] .  ... 
doi:10.3390/asi5030057 fatcat:cpnitagmdze5bpla5l6koaaiwy

Neural Network Based Message Concealment Scheme

Dr. Amol Dhakne, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti, Shashank Singh
2022 International Journal for Research in Applied Science and Engineering Technology  
Keywords: Cryptography key, encryption system, encryption algorithm, artificial neural network,chaos maps, logistic encryption.  ...  We show that Neural Networks can execute symmetric encryption in an adversarial context in this paper, and we build on the existing literature on the subject.  ...  ,L Then, using the mod operation, transform the pixel values to an unsigned integer in the range of 0 to 255.The initial values of the chaos map is recalculated after every pixel encryption based on the  ... 
doi:10.22214/ijraset.2022.42522 fatcat:73poryu6zbbvddglyadn5vfqly

Cancelable Multimodal Biometrics Based on Chaotic Maps

Sanaa Ghouzali, Ohoud Nafea, Abdul Wadood, Muhammad Hussain
2021 Applied Sciences  
We propose applying a chaotic maps-based transform on the biometric features to address the cancelability issue.  ...  We used Logistic map and Torus Automorphism to generate cancelable biometric features of the face and fingerprint minutia points, respectively.  ...  In [11] , the authors introduced a chaos-based encryption algorithm that merges Murillo-Escobar's scheme and the Logistic map to ensure a higher security level of fingerprint templates.  ... 
doi:10.3390/app11188573 fatcat:yhykmnegenbhvpadryhu2u7lii

Multi-image encryption based on compressed sensing and deep learning in optical gyrator domain

Renjie Ni, Fan Wang, Jun Wang, Yuhen Hu
2021 IEEE Photonics Journal  
In this paper, a multi-image encryption scheme based on compressed sensing (CS) and deep learning in the optical gyrator domain is proposed.  ...  To our best knowledge, CS reconstruction algorithms based on deep learning is firstly used for image encryption.  ...  In this scheme, CS compression is firstly applied to multiple plaintext images to obtain multiple measurements, and then the pixels of each measurement are scrambled with a logistic map chaotic system.  ... 
doi:10.1109/jphot.2021.3076480 fatcat:uzws4k42lbbo3d3cdbcrmf64oq

Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map

Abeer Tariq Maolood, Ekhlas Khalaf Gbashi, Eman Shakir Mahmood
2022 International Journal of Power Electronics and Drive Systems (IJPEDS)  
In this paper, a new light weight stream cipher method is presented and investigated for video encryption based on hybrid chaotic map and ChaCha20 algorithm.  ...  The frames sequences are encrypted-decrypted based on symmetric scheme with assist of ChaCha20 algorithm.  ...  Their work was presented a hybrid chaotic structure based on multiple combined maps for different media encryption (text, voice, image, and video).  ... 
doi:10.11591/ijece.v12i5.pp4988-5000 fatcat:aoodavdjlnfk3jj3bo3hydchu4

A Proposed Chaotic-Switched Turbo Coding Design and Its Application for Half-Duplex Relay Channel

Tamer H. M. Soliman, Fengfan Yang, S. Ejaz
2015 Discrete Dynamics in Nature and Society  
In these schemes the design of turbo codes chaotically changed depending on one or more chaotic maps.  ...  As we utilize the chaotic maps as a tool for hiding and securing the coding design in turbo coding system, this proposed system model can provide both data secrecy and data reliability in one process to  ...  In this work, we propose new efficient chaos secured turbo coding schemes based on using chaotic maps as a switching element to chaotically control the turbo encoder output.  ... 
doi:10.1155/2015/818421 fatcat:budfk3fg6rd5phge236v5ytybi

A Digital Image Confidentiality Scheme Based on Pseudo-Quantum Chaos and Lucas Sequence

Khushbu Khalid Butt, Guohui Li, Fawad Masood, Sajid Khan
2020 Entropy  
This work recommends an innovative quantum color image encryption method focused on the Lucas series-based substitution box to enhance the competence of encryption.  ...  The chaotic system, along with the substitution box, exhibits additional complicated dynamical behavior, sufficient arbitrariness, and uncertainty than all others focused on just chaotic models.  ...  The existing schemes of quantum chaos have utilized the physical process of quantum chaos. We have developed a system merely based on equations that are widely used chaotic quantum map.  ... 
doi:10.3390/e22111276 pmid:33287044 fatcat:broqnupomrcwfldtlogb5tvaue

A Robust Chaotic and Fast Walsh Transform Encryption for Gray Scale Biomedical Image Transmission

Adelaide Nicole Kengnou Telem, Daniel Tchiotsop, Thomas Kanaa, Hilaire B. Fotsin, Didier Wolf
2015 Signal & Image Processing An International Journal  
In this work, a new scheme of image encryption based on chaos and Fast Walsh Transform (FWT) has been proposed.  ...  We used two chaotic logistic maps and combined chaotic encryption methods to the two-dimensional FWT of images.  ...  CONCLUSIONS In this work, a new scheme of image encryption based on chaos and FWT has been proposed to secure biomedical images.  ... 
doi:10.5121/sipij.2015.6307 fatcat:qyngnefvebac5l2yjkzjknrz4m

Efficient Transmission of 2D Chaotic Maps Encrypted Images with DWT-Based SC-FDMA LTE System

Elhadi Mehallel, Djamel Abed, Amar Bouchemal
2021 Periodica Polytechnica Electrical Engineering and Computer Science  
The 2D Chaotic baker map encryption algorithm has been used to encrypt images to enhance their security during transmission via SC-FDMA- based systems.  ...  The performance of the process of encrypted image transmission using the 2D Chaotic baker map algorithm with wavelet transform-based SC-FDMA (DWT SC-FDMA) system is evaluated in terms of different performance  ...  Many image encryption schemes based on chaotic maps have been developed in recent years [25] .  ... 
doi:10.3311/ppee.18173 fatcat:ftk4h5r5arfxnl2c4jgmktrujy
« Previous Showing results 1 — 15 out of 287 results