Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Microsystem Technologies"
DOI: 10.1007/s00542-020-04762-4
Abstract: Temporal complexity of data security algorithms for information exchange on internet is becoming a daunting challenge. Performance enhancement of these algorithms using multi core CPUs has now become the standard approach. An OpenMP implementation of…
read more here.
Keywords:
technique;
steganography technique;
implementation;
analysis ... See more keywords
Photo by kmuza from unsplash
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-5807-x
Abstract: Due to its inherent properties such as sensitivity to initial condition, ergodicity and systematic parametrization chaos systems have been extensively used in image encryption. However, one needs to optimize the chaos for each image being…
read more here.
Keywords:
based image;
image encryption;
image;
encryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Multidimensional Systems and Signal Processing"
DOI: 10.1007/s11045-018-0589-x
Abstract: Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public network such as Internet make it easy for eavesdroppers to approach…
read more here.
Keywords:
based efficient;
chaos based;
security;
image ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Nonlinear Dynamics"
DOI: 10.1007/s11071-018-4056-x
Abstract: Chaos-based cryptology has become one of the most common design techniques to design new encryption algorithms in the last two decades. However, many proposals have been observed to be weak against simple known attacks. However,…
read more here.
Keywords:
image encryption;
nonlinear dynamics;
encryption;
chaos based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Real-time Image Processing"
DOI: 10.1007/s11554-021-01073-3
Abstract: In this paper a new approach for designing invisible non-blind full crypto-watermarking system targeting images security on FPGA platform is presented. This new design is based on the Hardware-Software co-design approach using the High-Level Synthesis…
read more here.
Keywords:
system;
real time;
watermarking system;
approach ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Optik"
DOI: 10.1016/j.ijleo.2020.164925
Abstract: Abstract The paper proposes a chaos-based image hybrid stream and block encryption algorithm, a key stretching method is implemented to further enhance its security. The random time span sequence and salt sequences are generated by…
read more here.
Keywords:
based image;
image;
encryption algorithm;
key stretching ... See more keywords
Photo by usgs from unsplash
Sign Up to like & get
recommendations!
0
Published in 2017 at "Optics and Lasers in Engineering"
DOI: 10.1016/j.optlaseng.2016.07.010
Abstract: Abstract In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive…
read more here.
Keywords:
encryption scheme;
based partial;
partial image;
scheme ... See more keywords
Photo from academic.microsoft.com
Sign Up to like & get
recommendations!
0
Published in 2021 at "Chaos"
DOI: 10.1063/5.0061639
Abstract: Chaos-based image encryption schemes have been extensively employed over the past few years. Many issues such as the dynamical degradation of digital chaotic systems and information security have been explored, and plenty of successful solutions…
read more here.
Keywords:
based cryptography;
chaos based;
reliable chaos;
galois field ... See more keywords
Photo by usgs from unsplash
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Modern Optics"
DOI: 10.1080/09500340.2019.1571249
Abstract: ABSTRACT A novel image encryption algorithm using the random fractional DCT (RFrDCT) and the chaos-based Game of Life (GoL) is presented here. Firstly the plaintext image is transformed by the reality-preserving RFrDCT into the RFrDCT…
read more here.
Keywords:
image encryption;
image;
using random;
encryption ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3142536
Abstract: In this paper, a new chaos-based true random number generator (TRNG) and a sliding mode controller (SMC) to synchronize the proposed TRNGs are proposed. Firstly, the continuous chaotic system is transformed into a discrete system…
read more here.
Keywords:
chaos based;
based true;
true random;
random number ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3223355
Abstract: Saving videos streaming from the unlawful users became an urgent claim. Cryptography and Steganography are the most important and indispensable processes to protect and embed the multimedia data during the transfer or storage process. Chaotic-based…
read more here.
Keywords:
encryption technique;
chaos based;
avc;
encryption ... See more keywords