Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Multimedia Systems"
DOI: 10.1007/s00530-019-00647-3
Abstract: With the massive use of images over the Internet, the security of some of them has become critical. One of the most used encryption algorithms is AES. Although this algorithm provides high security for text…
read more here.
Keywords:
video;
image;
real time;
towards real ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-021-04733-z
Abstract: Motivated by the existing circuit model of quantum convolutional neural network, a new quantum convolutional neural network circuit model is devised, which is combined with quantum chaotic map to construct a symmetric cryptosystem. Quantum chaotic…
read more here.
Keywords:
quantum chaotic;
cryptosystem;
quantum convolutional;
convolutional neural ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-018-1005-3
Abstract: With the advance of the communication technology and the massive flow of information across the internet, it is becoming urgent to keep the confidentiality of the transmitted information. Using the internet has been extended to…
read more here.
Keywords:
merkle hellman;
optimization;
cryptanalysis;
optimization algorithm ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Optical and Quantum Electronics"
DOI: 10.1007/s11082-019-1769-0
Abstract: In this paper, an asymmetric hybrid cryptosystem with coherent superposition, equal modulus and random decomposition in hybrid transform domain is proposed. To further strengthen the security of the cryptosystem, a hyperchaotic system is used as…
read more here.
Keywords:
equal modulus;
transform;
cryptosystem;
asymmetric hybrid ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Telecommunication Systems"
DOI: 10.1007/s11235-016-0175-1
Abstract: This paper proposes a new cryptosystem system that combines DNA cryptography and algebraic curves defined over different Galois fields. The security of the proposed cryptosystem is based on the combination of DNA encoding, a compression…
read more here.
Keywords:
code;
dna;
new dna;
cryptosystem based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-4960-2
Abstract: Abstract The paper proposes a secure audio cryptosystem that realize integrity, authentication and confidentiality. The proposed audio cryptosystem achieves integrity by applying a message digest algorithm, authentication by employing LSB watermarking and confidentiality through encryption…
read more here.
Keywords:
audio cryptosystem;
proposed audio;
image;
encryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Dynamics and Control"
DOI: 10.1007/s40435-015-0169-y
Abstract: In this paper, the synchronization method of two identical fractional order chaotic systems is developed with lower order than the existing fractional order 3 by designing suitable sliding mode control. Further, a new cryptosystem is…
read more here.
Keywords:
order;
control;
fractional order;
order chaotic ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Optik"
DOI: 10.1016/j.ijleo.2021.167300
Abstract: Abstract A chaos based cryptosystem requires a chaotic map with complex nonlinearity and large chaotic regime for the generation of secret key. The purpose of this research is to enhance the robustness of a cryptosystem…
read more here.
Keywords:
chaotic band;
large chaotic;
cryptosystem;
map ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Optics Communications"
DOI: 10.1016/j.optcom.2017.10.061
Abstract: Abstract A phase-retrieval attack free cryptosystem based on the cylindrical asymmetric diffraction and double-random phase encoding (DRPE) is proposed. The plaintext is abstract as a cylinder, while the observed diffraction and holographic surfaces are concentric…
read more here.
Keywords:
phase;
diffraction;
retrieval attack;
phase retrieval ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Optics and Lasers in Engineering"
DOI: 10.1016/j.optlaseng.2017.01.005
Abstract: Abstract An enhanced asymmetric cryptosystem for color image is proposed by using equal modulus decomposition (EMD) in the gyrator transform domains. In this scheme, the EMD is performed to create the effective trapdoor one-way function.…
read more here.
Keywords:
cryptosystem;
color;
color image;
gyrator transform ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Optics and Lasers in Engineering"
DOI: 10.1016/j.optlaseng.2020.106399
Abstract: Abstract In this paper, we proposed an iterative attacking algorithm to the pure phase asymmetric optical cryptosystem based on unequal modulus decomposition. Furthermore, we have proposed a secure asymmetric cryptosystem based on cascaded unequal modulus…
read more here.
Keywords:
cryptosystem;
unequal modulus;
image;
modulus decomposition ... See more keywords