Search
Search Results
-
Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network
In this paper, a new chaotic image encryption and authentication model based on Elliptic Curves is proposed. The Elliptic Curve Diffie-Hellman (ECDH)...
-
A Bit-Level Three-Dimensional Rectangular Image Encryption Algorithm Using New Chaotic Maps
AbstractSome two-dimensional chaotic maps are used for scrambling in image encryption. However, the encryption is often unsafe without destroying...
-
PTAS for Steiner Tree on Map Graphs
We study the Steiner tree problem on map graphs, which substantially generalize planar graphs as they allow arbitrarily large cliques. We obtain a... -
A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system
The concept of encryption is as old as the reality that confidential information has been interchanging among people. The art of transferring secret...
-
Discrete Chaotic Transformations of Hidden Messages to Disguise Them as Noise in Steganography Problems
AbstractThe paper considers the problem of masking a hidden message in HUGO stegosystems under natural noise in the communication channel using...
-
Identifying and Mitigating Algorithmic Bias in Student Emotional Analysis
Algorithmic bias in educational environments has garnered increasing scrutiny, with numerous studies highlighting its significant impacts. This... -
Fast Approximate IsoRank for Scalable Global Alignment of Biological Networks
The pioneering and still popular IsoRank method of Singh, Xu, and Berger for global alignment of two protein-protein interaction networks across... -
Simultaneous encryption of multiple images using pseudo-random sequences generated by modified Newton-Raphson technique
A multiple image encryption using pseudo random (PR) sequence is proposed in this article. A non-chaotic technique pillared on modified Newton-...
-
ELECTRA: A Comprehensive Ecosystem for Electric Vehicles and Intelligent Transportation Using YOLO
The “ELECTRA” program resolves important obstacles facing India EV field using adaptable MERN suite and mixing customer-facing and supporting... -
Image encryption algorithm based on quantum chaotic map and DNA coding
With the rapid development of network and information technology, people are paying more attention to the security of information, particularly...
-
Construction of Two Dimensional Cubic-Tent-Sine Map for Secure Image Transmission
A fusion two dimensional Cubic Tent Sine (CTS) map is formulated and its dynamic range is analysed. To explore its application in secure electronic... -
Parallel approaches to improve the speed of chaotic-maps-based encryption using GPU
Chaos-based cryptography has become a major interest for providing effective, fast and secure encryption in the recent few years. Chaos-based...
-
On the Practical Power of Automata in Pattern Matching
Many papers in the intersection of theoretical and applied algorithms show that the simple, asymptotically less efficient algorithm, performs better...
-
Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem
New hybrid cryptosystems represent a highly effective method for increasing security levels of Voice over Internet Protocol (VoIP) systems. In this...
-
A lightweight and robust block cipher algorithm for real-time applications
Ensuring the protection of big data during transmission or storage represents a highly significant concern for both enterprises and individual users....
-
Towards a super-resolution based approach for improved face recognition in low resolution environment
The video surveillance activity generates a vast amount of data, which can be processed to detect miscreants. The task of identifying and recognizing...
-
A chaotic permutation and diffusion based image encryption algorithm for secure communications
In this digital era, a huge amount of digital data is being generated, transmitted, and stored over the network. Images are widely searched, shared...
-
Dimension Estimates for Dynamical Systems with Some Degree of Non-injectivity and Nonsmoothness
In this chapter dimension estimates for maps and dynamical systems with specific properties are derived. In Sect. 10.1 a class of non-injective... -
Securing multimedia videos using space-filling curves
Securing online multimedia content has become a significant concern in this digital era. Nowadays, several organizations provide premium video...
-
A new RGB image encryption algorithm based on hyper-chaotic-discrete-wavelet-packet-transform
The paper proposes a new hyper-chaotic-discrete-wavelet-packet-transform encryption algorithm for RGB images. The highlight is that the 512-bit hash...