A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Finite Precision Implementation of an Image Encryption Scheme Based on DNA Encoding and Binarized Chaotic Cores
2021
IEEE Access
DNA encoding adds an extra layer of security to the algorithm by converting both the image and the chaotic stream to DNA sequences using specific DNA encoding rule. ...
This paper first discusses the limited periodicity of 1D maps under fixed point precision representation, then, presents an image encryption algorithm based on DNA encoding and two specially configured ...
Both issues are tackled by implementing a chaotic core comprised of two cross-coupled skew-tent maps as reported in [26] . it was proved that utilizing the cross coupled scheme ensures increasing the ...
doi:10.1109/access.2021.3118050
fatcat:rbddyvwhnjgt5itli6z6i646vi
Joint Image Compression and Encryption Using IWT with SPIHT, Kd-Tree and Chaotic Maps
2018
Applied Sciences
In this paper, a new method for joint image compression and encryption based on set partitioning in hierarchical trees (SPIHT) with optimized Kd-tree and multiple chaotic maps was proposed. ...
Finally, the compressed output was further encrypted with varying parameter logistic maps and modified quadratic chaotic maps. ...
In [37] , joint compression and encryption of image data through cross-coupled chaotic maps and Non-uniform Discrete Cosine Transform was proposed. ...
doi:10.3390/app8101963
fatcat:ncoukmnn2rhhhb34qkoxhb2sgq
Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences
2021
Security and Communication Networks
To enhance the security of the image encryption algorithm, the initial value of the chaotic system is calculated by the 256-bit binary sequence, which is obtained by taking the statistics information of ...
A nonlinear multi-image encryption scheme is proposed by combining the reality-preserving discrete fractional angular transform with the deoxyribonucleic acid sequence operations. ...
Reference [62] proposed a multi-grayscale-image encryption scheme in a cross-coupled manner. ...
doi:10.1155/2021/6650515
fatcat:vdzr46u7sff77gabzo6bbd5tzi
A Technique for Securing Multiple Digital Images Based on 2D Linear Congruential Generator, Silver Ratio, and Galois Field
2021
IEEE Access
INDEX TERMS Digital images, multiple image encryption, 2D Linear Congruential Generator (LCG), silver ratio, Galois field. ...
than that of the plain (input) images; the authors have used a large number of parameters in the encryption/decryption process, besides the secret key; and the cipher/decipher rounds use the same key ...
[13] proposed a multiple gray image encryption scheme based on the cross-coupled chaotic maps. ...
doi:10.1109/access.2021.3094129
fatcat:zlyk2unfyzaujk52462exo6i5q
Chaotic Image Encryption Algorithm Based on Zigzag Transform with Bidirectional Crossover from Random Position
2021
IEEE Access
INDEX TERMS Chaos, image encryption, zigzag transform, one-dimensional logistic chaotic system, hyperchaotic Chen system. ...
After multiple rounds of Zigzag transformation, the Logistic system is used to generate a sorted sequence to scramble the image. ...
In the diffusion stage, multiple rounds of coupling diffusion are used to achieve the purpose of changing the pixel value. ...
doi:10.1109/access.2021.3099214
fatcat:6q2bago4tnaojievnxexxdzk2e
A Novel Image-Encryption Scheme Based on a Non-Linear Cross-Coupled Hyperchaotic System with the Dynamic Correlation of Plaintext Pixels
2020
Entropy
Based on a logistic map and Feigenbaum map, we proposed a logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM) model. ...
Compared with the existing cross-coupled mapping, LF-NCHM demonstrated a wider hyperchaotic range, better ergodicity and richer dynamic behavior. ...
Non-Linear Cross-Coupled Chaotic Map In 2014, Paral et al. [33] proposed a cross-coupled chaotic map, whose structure is shown in Figure 1 . ...
doi:10.3390/e22070779
pmid:33286550
fatcat:thnzamdgc5fe7a5m3p4oehply4
A Hybrid Chaotic Encryption Scheme for Wireless Body Area Networks
2020
IEEE Access
In this paper, a security scheme based on chaotic mapping for WBAN is proposed. ...
This algorithm makes use of the hybrid chaotic system obtained by the combination of Logistic and Tent mapping as the sequence generator, which can select the effective precision according to the importance ...
An algorithm for generating binary sequences using enhanced cross-coupled skew mapping is proposed in paper [25] . ...
doi:10.1109/access.2020.3029263
fatcat:wzg6ckdhjbfchbygpfon2acf6e
A Non-adaptive Partial Encryption of Grayscale Images based on Chaos
2013
Procedia Technology - Elsevier
We decompose the original grayscale image into its corresponding binary eight bit planes then encrypted using couple tent map based pseudorandom binary number generator (PRBNG). ...
In this paper, A Non-adaptive Partial Encryption of Grayscale Images Based on Chaoshas been proposed. In Partial encryption speed and time is the main factor. ...
For image encryption a symmetric key cryptography multiplicative cipher is used. Similarly for compression Discrete Cosine Transform is used. ...
doi:10.1016/j.protcy.2013.12.408
fatcat:jnlkhdzqr5altkm25i44qcx3dm
Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption
2020
Complexity
In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. ...
Through the evaluation of encryption performance, it is concluded that there is no direct relationship between the pristine image and encrypted image. ...
In [51] , a random bitstream is generated by comparing piecewise linear chaotic maps consisting of cross-coupled two Tent maps. ...
doi:10.1155/2020/8274685
doaj:01cde497046545768ab094a85b135960
fatcat:3e7h5cjcxjhotcwv2d4vqy5jwa
Chaotic Lightweight Cryptosystem for Image Encryption
2021
Advances in Multimedia
At first, we have presented a standard framework and algorithm based on two chaotic maps such as Arnold and logistic for lightweight image encryption and performed some experiments. ...
In this study, we have studied the chaotic-based lightweight image encryption method. ...
[39] proposed a multiple-image encryption method based on cross-coupled chaotic maps. But the system is not tested for color images. ...
doi:10.1155/2021/5527295
fatcat:csmkkzixtnbkndiqvr35rlm2su
Secret Image Sharing Scheme Based on Pixel Segmentation Strategy Exploiting Modification Direction (PSSEMD) with High Quality Shadows
2019
International journal of recent technology and engineering
Here Lossless image compression is done with the concern of sensitive information. Then chaotic encryption and decryption method is used for better security during image sharing process. ...
Pixel Segmentation Strategy EMD (PSSEMD) Method is used for wrapping confidential bit on all pixel cover image. the images as secret and cover are rebuilt by Shadow images. ...
Logistic map is widely popular and used as (9) The Logistic sequence of probability density function is represented as (10) The encryption algorithm can be described as follows: Step1. a chaotic systems ...
doi:10.35940/ijrte.d5329.118419
fatcat:ukhbcejchrc2fghdsm6lu2x2wa
Novel Scheme for Image Encryption Combining 2D Logistic-Sine-Cosine Map and Double Random-Phase Encoding
2019
IEEE Access
INDEX TERMS Image encryption, 2D logistic map, double random-phase encoding, discrete wavelet transform. ...
Performance analysis shows that it has larger chaotic range, bigger Lyapunov exponent and more complex chaotic behavior than the classical 2D Logistic map. ...
In [23] , using the advantage of the chaotic intertwining logistic map and its unpredictability, a new cipher with pre-modular, permutation and diffusion is designed for image encryption chaotic intertwining ...
doi:10.1109/access.2019.2958319
fatcat:luer5t2jzbfy7lkk76hdv355vm
Review of Image Compression and Encryption Techniques
2017
International Journal of Advanced Computer Science and Applications
The first category, i.e. cryptographic technique followed by compression method, focuses more on image security than the reduction of a size of data. ...
In line with a growing need for data and information transmission in a safe and quick manner, researches on image protection and security through a combination of cryptographic and compression techniques ...
A new chaotic map is recommended based on Devaney theory, which works as a local map of NCML called system spatiotemporal cross chaotic. ...
doi:10.14569/ijacsa.2017.080212
fatcat:7ct6ex2c55aynjv2jsby2fp7bi
A Novel Parallelizable Chaotic Image Encryption Scheme based on Elliptic Curves
2021
IEEE Access
Numerous chaotic maps have been proposed in the literature and used in image encryption schemes. ...
Song, "2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image Encryption," IEEE Access, vol. 7, pp. 14081-14098, 2019. [5] Z. Hua, Y. Zhou, and H. ...
doi:10.1109/access.2021.3068931
fatcat:aspejfwegfbndpu5pdarh63l5m
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm
2020
Security and Communication Networks
This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest–Shamir–Adleman (RSA) algorithm. ...
First, the parameters of the generalized Arnold map are generated by an asymmetric encryption-system RSA algorithm, and the keystream is produced iteratively. ...
[35] used the generated cosine transform chaotic map to further propose an image encryption scheme. e generated chaotic map exhibits more complicated chaotic behavior than the existing chaotic map. ...
doi:10.1155/2020/9721675
fatcat:sgzzuvxgzvaafmkgjbinkwxdwy
« Previous
Showing results 1 — 15 out of 89 results