We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 840 results
  1. Text Encryption Scheme Based on Chaotic Map and DNA Strand Displacement

    A text encryption scheme is proposed by combining chaotic map, DNA encoding and DNA strand displacement (DSD). The scheme firstly scrambles the...
    **g Yang, Congcong Liu, ... Guoqing He in Bio-Inspired Computing: Theories and Applications
    Conference paper 2024
  2. Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm

    Chaotic map is a kind of discrete chaotic system. The existing chaotic maps suffer from optimal parameters in terms of chaos measurements. In this...

    Abdurrahim Toktas, Uğur Erkan, ... **ngyuan Wang in Neural Computing and Applications
    Article 10 March 2023
  3. A new image encryption approach that uses an improved Hill-Vigenère method and chaotic maps

    Image encryption is an interesting field of research that is an adequate solution to ensure the safety and security of private information from...

    S. El Kaddouhi, Y. Qobbi, ... A. Jarjar in Multimedia Tools and Applications
    Article 03 July 2024
  4. Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional chaotic map and its security application

    Classical one-dimensional chaotic map has many ideal characteristics which is quite suitable for many different kinds of scientific fields,...

    Yingpeng Zhang, Hongyue **ang, ... Lingfeng Liu in Multimedia Tools and Applications
    Article 12 October 2022
  5. Image encryption based on S-box generation constructed by using a chaotic autonomous snap system with only one equilibrium point

    An autonomous chaotic snap system with only one equilibrium point is proposed and analyzed in this paper. Periodic oscillations, self-excited chaotic...

    Balamurali Ramakrishnan, Yannick Pascal Kamdeu Nkandeu, ... Karthikeyan Rajagopal in Multimedia Tools and Applications
    Article 16 August 2023
  6. A Closer Look at Attacks on Lightweight Cryptosystems: Threats and Countermeasures

    Cryptosystems are fundamental to securing digital communication and information exchange in our interconnected world. However, as technology...
    Khusanboy Kodirov, Hoon-Jae Lee, Young Sil Lee in Intelligent Human Computer Interaction
    Conference paper 2024
  7. A symmetric image encryption scheme based on hybrid analog-digital chaotic system and parameter selection mechanism

    In recent years, various chaos-based image encryption algorithms have been proposed to meet the growing demand for real-time secure image...

    Jun Zheng, Han** Hu in Multimedia Tools and Applications
    Article 11 March 2021
  8. Symmetric and Asymmetric Cryptography on the Special Linear Cracovian Quasigroup

    We propose symmetric and public key cryptographic protocols on the non-associative special linear Cracovian quasigroup. The...
    Zbigniew Lipiński, Jolanta Mizera-Pietraszko in Intelligent Information and Database Systems
    Conference paper 2022
  9. CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management

    Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and...

    Dulal Kumbhakar, Subhajit Adhikari, Sunil Karforma in Multimedia Tools and Applications
    Article 31 May 2024
  10. A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations

    In this paper, an efficient image encryption scheme based on a novel mixed linear–nonlinear coupled map lattice (NMLNCML) system and DNA operations...

    Yuanyuan Li, **aoqing You, ... Jungang Lou in Frontiers of Information Technology & Electronic Engineering
    Article 01 June 2023
  11. Design and Implementation of Multilayer Encryption for Audio File Security

    Using audio encryption, secure information can be transmitted. By doing this, Sender and Receiver audio security is guaranteed. The security of...
    Lakhichand Khushal Patil, Kalpesh A. Popat in Advancements in Smart Computing and Information Security
    Conference paper 2024
  12. A novel secure cryptography model for data transmission based on Rotor64 technique

    In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so...

    Ibrahim Obeidat, Ala Mughaid, ... Laith Abualigah in Multimedia Tools and Applications
    Article 30 September 2023
  13. Implementation of Homomorphic Encryption Schemes in Fog Computing

    In today's date, fog computing is on the rise due to its characteristics. Its ability to provide smart devices with close-by computing capabilities...
    Shraiyash Pandey, Bharat Bhushan, ... Aayush Juyal in Computing, Internet of Things and Data Analytics
    Conference paper 2024
  14. Securing Shared Data Based on Homomorphic Encryption Schemes

    Today, in this modern world, privacy plays a significant role where the data is available everywhere. Because of utilization of large amount of...
    K. Renuka Devi, S. Nithyapriya, ... S. Suganyadevi in Homomorphic Encryption for Financial Cryptography
    Chapter 2023
  15. An Introduction to Classical and Modern Cryptography

    The remote environment bounded us to share information, documents, money, etc. with the help of applications, devices, and tools. The information,...
    Rajkumar Banoth, Rekha Regar in Classical and Modern Cryptography for Beginners
    Chapter 2023
  16. Codes and Secret Messages: From the Ancient Origins of Steganography and Cryptography and their Relevance to Today

    The Art of War concludes with the chapter on espionage and the use of secret agents. About them, Sun Tzu also says: “They are a ruler’s treasure.”...
    Peter Kestner in The Art of Cyber Warfare
    Chapter 2024
  17. The Lone Cryptologists: Escape from Riverbank

    The Friedmans were back at Riverbank by the summer of 1919, and they had cause to immediately regret their decision. William spent time finishing up...
    John F. Dooley in The Gambler and the Scholars
    Chapter 2023
  18. A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

    In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting...

    Sanjay Kumar, Deepmala Sharma in Artificial Intelligence Review
    Article Open access 12 March 2024
  19. Study of Various Attacks Over Images Transferred Optically Through Communication Channel

    On the basis of double random phase encoding (DRPE), we present an improved picture encryption technique in this work. In order to protect images...
    Anshika Malsaria, Pankaj Vyas in Cyber Warfare, Security and Space Research
    Conference paper 2022
  20. Blockchain-Based EMR Enhancement: Introducing PMI-Chain for Improved Medical Data Security and Privacy

    We have created a solution called PMI-Chain to address the challenges faced by Electronic Medical Records (EMR) management systems. These challenges...
    Conference paper 2024
Did you find what you were looking for? Share feedback.