Articles with "chaos based" as a keyword



Photo from wikipedia

Multicore implementation and performance analysis of a chaos based LSB steganography technique

Sign Up to like & get
recommendations!
Published in 2020 at "Microsystem Technologies"

DOI: 10.1007/s00542-020-04762-4

Abstract: Temporal complexity of data security algorithms for information exchange on internet is becoming a daunting challenge. Performance enhancement of these algorithms using multi core CPUs has now become the standard approach. An OpenMP implementation of… read more here.

Keywords: technique; steganography technique; implementation; analysis ... See more keywords
Photo by kmuza from unsplash

Optimizing chaos based image encryption

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-5807-x

Abstract: Due to its inherent properties such as sensitivity to initial condition, ergodicity and systematic parametrization chaos systems have been extensively used in image encryption. However, one needs to optimize the chaos for each image being… read more here.

Keywords: based image; image encryption; image; encryption ... See more keywords
Photo by scottwebb from unsplash

Chaos based efficient selective image encryption

Sign Up to like & get
recommendations!
Published in 2019 at "Multidimensional Systems and Signal Processing"

DOI: 10.1007/s11045-018-0589-x

Abstract: Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public network such as Internet make it easy for eavesdroppers to approach… read more here.

Keywords: based efficient; chaos based; security; image ... See more keywords
Photo by steve_j from unsplash

Brief review on application of nonlinear dynamics in image encryption

Sign Up to like & get
recommendations!
Published in 2018 at "Nonlinear Dynamics"

DOI: 10.1007/s11071-018-4056-x

Abstract: Chaos-based cryptology has become one of the most common design techniques to design new encryption algorithms in the last two decades. However, many proposals have been observed to be weak against simple known attacks. However,… read more here.

Keywords: image encryption; nonlinear dynamics; encryption; chaos based ... See more keywords
Photo from wikipedia

Real-time FPGA implementation of a secure chaos-based digital crypto-watermarking system in the DWT domain using co-design approach

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Real-time Image Processing"

DOI: 10.1007/s11554-021-01073-3

Abstract: In this paper a new approach for designing invisible non-blind full crypto-watermarking system targeting images security on FPGA platform is presented. This new design is based on the Hardware-Software co-design approach using the High-Level Synthesis… read more here.

Keywords: system; real time; watermarking system; approach ... See more keywords
Photo from wikipedia

Chaos-based image hybrid encryption algorithm using key stretching and hash feedback

Sign Up to like & get
recommendations!
Published in 2020 at "Optik"

DOI: 10.1016/j.ijleo.2020.164925

Abstract: Abstract The paper proposes a chaos-based image hybrid stream and block encryption algorithm, a key stretching method is implemented to further enhance its security. The random time span sequence and salt sequences are generated by… read more here.

Keywords: based image; image; encryption algorithm; key stretching ... See more keywords
Photo by usgs from unsplash

Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms

Sign Up to like & get
recommendations!
Published in 2017 at "Optics and Lasers in Engineering"

DOI: 10.1016/j.optlaseng.2016.07.010

Abstract: Abstract In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive… read more here.

Keywords: encryption scheme; based partial; partial image; scheme ... See more keywords
Photo from academic.microsoft.com

A reliable chaos-based cryptography using Galois field.

Sign Up to like & get
recommendations!
Published in 2021 at "Chaos"

DOI: 10.1063/5.0061639

Abstract: Chaos-based image encryption schemes have been extensively employed over the past few years. Many issues such as the dynamical degradation of digital chaotic systems and information security have been explored, and plenty of successful solutions… read more here.

Keywords: based cryptography; chaos based; reliable chaos; galois field ... See more keywords
Photo by usgs from unsplash

Image encryption using the random FrDCT and the chaos-based game of life

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Modern Optics"

DOI: 10.1080/09500340.2019.1571249

Abstract: ABSTRACT A novel image encryption algorithm using the random fractional DCT (RFrDCT) and the chaos-based Game of Life (GoL) is presented here. Firstly the plaintext image is transformed by the reality-preserving RFrDCT into the RFrDCT… read more here.

Keywords: image encryption; image; using random; encryption ... See more keywords
Photo from wikipedia

Design and Synchronization of Chaos-Based True Random Number Generators and Its FPGA Implementation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3142536

Abstract: In this paper, a new chaos-based true random number generator (TRNG) and a sliding mode controller (SMC) to synchronize the proposed TRNGs are proposed. Firstly, the continuous chaotic system is transformed into a discrete system… read more here.

Keywords: chaos based; based true; true random; random number ... See more keywords
Photo by joshuafuller from unsplash

Chaos Based Encryption Technique for Compressed H264/AVC Videos

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3223355

Abstract: Saving videos streaming from the unlawful users became an urgent claim. Cryptography and Steganography are the most important and indispensable processes to protect and embed the multimedia data during the transfer or storage process. Chaotic-based… read more here.

Keywords: encryption technique; chaos based; avc; encryption ... See more keywords