![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure
Since the first appearance in Fridrich’s design, the usage of permutation–diffusion structure for designing digital image cryptosystem has been receiving increasing research attention in the field of chaos-bas...
-
Article
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher
Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and...
-
Article
An image encryption scheme based on time-delay and hyperchaotic system
In this paper, a novel image encryption scheme based on time-delay and hyperchaotic system is suggested. The time-delay phenomenon is commonly observed in daily life and is incorporated in the generation of ps...
-
Article
Breaking a novel colour image encryption algorithm based on chaos
Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number ...
-
Article
Decouple implementation of weight decay for recursive least square
In the conventional recursive least square (RLS) algorithm for multilayer feedforward neural networks, controlling the initial error covariance matrix can limit weight magnitude. However, the weight decay effe...
-
Article
An efficient chaotic image encryption algorithm based on a generalized Arnold map
An efficient image encryption algorithm using the generalized Arnold map is proposed. The algorithm is composed of two stages, i.e., permutation and diffusion. First, a total circular function, rather than the...
-
Chapter and Conference Paper
Chaos-Based Selective Encryption for AVS Video Coding Standard
A chaos-based selective encryption scheme implemented on the Audio Video Standard (AVS) is proposed. The scheme employs multiple Rényi chaotic maps to generate a pseudorandom bit sequence for the encryption of...
-
Chapter
Image Encryption Using Chaotic Maps
In recent years, a variety of chaos-based image cryptosystems have been proposed. An architecture of such kind of cryptosystems is composed of multiple rounds of substitution and diffusion. In the substitution...
-
Chapter and Conference Paper
The Local True Weight Decay Recursive Least Square Algorithm
The true weight decay recursive least square (TWDRLS) algorithm is an efficient fast online training algorithm for feedforward neural networks. However, its computational and space complexities are very large....
-
Article
A More Secure Chaotic Cryptographic Scheme Based on the Dynamic Look-Up Table
We have proposed a chaotic cryptographic scheme based on iterating the logistic map and updating the look-up table dynamically. However, it has been broken recently. In this paper, the weaknesses of the origin...
-
Article
Hopf Bifurcation on a Two-Neuron System with Distributed Delays: A Frequency Domain Approach
In this paper, a more general two-neuron model with distributed delays and weak kernel is investigated. By applying the frequency domain approach and analyzing the associated characteristic equation, the exist...
-
Article
Hopf Bifurcation and Stability of Periodic Solutions for van der Pol Equation with Distributed Delay
The van der Pol equation with a distributed time delay is analyzed. Itslinear stability is investigated by employing the Routh–Hurwitzcriteria. Moreover, the local asymptotic stability conditions are alsoderiv...
-
Chapter
An Elliptic Curve Random Number Generator
A random number generator based on the addition of the points on an elliptic curve over finite fields is proposed. Sequences produced by this generator have passed standard statistical tests. As a result, the ...
-
Chapter
A Modified Chaotic Cryptographic Method
We propose a modified version of the chaotic cryptographic method based on iterating a logistic map. Simulation results show that the distribution of the ciphertext is flatter and the encryption time is shorte...
-
Article
A Practical Sequential Method for Principal Component Analysis
When increasing numbers of principalcomponents are extracted by using the sequentialmethod proposed in [1] by Banour and Azimi-Sadjadi, the accumulated extractionerror will become dominant and affect the extra...
-
Article
On-line Successive Synthesis of Wavelet Networks
An approach for the on-line synthesis of wavelet network using recursive least square (RLS) training is proposed. It is based on the concept of successive approximation of the system function to be learned. By...