We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 159 results
  1. Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network

    In this paper, a new chaotic image encryption and authentication model based on Elliptic Curves is proposed. The Elliptic Curve Diffie-Hellman (ECDH)...

    Priyansi Parida, Chittaranjan Pradhan, ... Cheng-Chi Lee in Multimedia Tools and Applications
    Article 06 March 2023
  2. A Bit-Level Three-Dimensional Rectangular Image Encryption Algorithm Using New Chaotic Maps

    Abstract

    Some two-dimensional chaotic maps are used for scrambling in image encryption. However, the encryption is often unsafe without destroying...

    Zhenhui Li, Zhouli He, ... Renyuan Jia in Automatic Control and Computer Sciences
    Article 27 August 2023
  3. PTAS for Steiner Tree on Map Graphs

    We study the Steiner tree problem on map graphs, which substantially generalize planar graphs as they allow arbitrarily large cliques. We obtain a...
    Jarosław Byrka, Mateusz Lewandowski, ... Sumedha Uniyal in LATIN 2020: Theoretical Informatics
    Conference paper 2020
  4. A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system

    The concept of encryption is as old as the reality that confidential information has been interchanging among people. The art of transferring secret...

    Ammar S. Alanazi, Noor Munir, ... Iqtadar Hussain in Multimedia Tools and Applications
    Article 09 March 2023
  5. Discrete Chaotic Transformations of Hidden Messages to Disguise Them as Noise in Steganography Problems

    Abstract

    The paper considers the problem of masking a hidden message in HUGO stegosystems under natural noise in the communication channel using...

    V. N. Kustov, A. G. Krasnov in Automatic Control and Computer Sciences
    Article 01 December 2021
  6. Identifying and Mitigating Algorithmic Bias in Student Emotional Analysis

    Algorithmic bias in educational environments has garnered increasing scrutiny, with numerous studies highlighting its significant impacts. This...
    T. S. Ashwin, Gautam Biswas in Artificial Intelligence in Education
    Conference paper 2024
  7. Fast Approximate IsoRank for Scalable Global Alignment of Biological Networks

    The pioneering and still popular IsoRank method of Singh, Xu, and Berger for global alignment of two protein-protein interaction networks across...
    Kapil Devkota, Anselm Blumer, ... Lenore Cowen in Research in Computational Molecular Biology
    Conference paper 2024
  8. Simultaneous encryption of multiple images using pseudo-random sequences generated by modified Newton-Raphson technique

    A multiple image encryption using pseudo random (PR) sequence is proposed in this article. A non-chaotic technique pillared on modified Newton-...

    Aakash Paul, Shyamalendu Kandar in Multimedia Tools and Applications
    Article 25 February 2022
  9. ELECTRA: A Comprehensive Ecosystem for Electric Vehicles and Intelligent Transportation Using YOLO

    The “ELECTRA” program resolves important obstacles facing India EV field using adaptable MERN suite and mixing customer-facing and supporting...
    Amol Dhumane, Shwetambari Chiwhane, ... Pronit Parida in Advanced Computing
    Conference paper 2024
  10. Image encryption algorithm based on quantum chaotic map and DNA coding

    With the rapid development of network and information technology, people are paying more attention to the security of information, particularly...

    Jian Zhang, Da Huo in Multimedia Tools and Applications
    Article 07 December 2018
  11. Construction of Two Dimensional Cubic-Tent-Sine Map for Secure Image Transmission

    A fusion two dimensional Cubic Tent Sine (CTS) map is formulated and its dynamic range is analysed. To explore its application in secure electronic...
    Sujarani Rajendran, Manivannan Doraipandian in Applications and Techniques in Information Security
    Conference paper 2019
  12. Parallel approaches to improve the speed of chaotic-maps-based encryption using GPU

    Chaos-based cryptography has become a major interest for providing effective, fast and secure encryption in the recent few years. Chaos-based...

    Amany Elrefaey, Amany Sarhan, Nada M. El-Shennawy in Journal of Real-Time Image Processing
    Article 12 January 2021
  13. On the Practical Power of Automata in Pattern Matching

    Many papers in the intersection of theoretical and applied algorithms show that the simple, asymptotically less efficient algorithm, performs better...

    Ora Amir, Amihood Amir, ... David Sarne in SN Computer Science
    Article Open access 06 April 2024
  14. Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem

    New hybrid cryptosystems represent a highly effective method for increasing security levels of Voice over Internet Protocol (VoIP) systems. In this...

    Elsayed M. Elshamy, Aziza I. Hussein, ... Hamdy M. Kelash in Multimedia Tools and Applications
    Article 15 November 2020
  15. A lightweight and robust block cipher algorithm for real-time applications

    Ensuring the protection of big data during transmission or storage represents a highly significant concern for both enterprises and individual users....

    Amal Hafsa, Mohamed Gafsi, Mohsen Machhout in Signal, Image and Video Processing
    Article 26 November 2023
  16. Towards a super-resolution based approach for improved face recognition in low resolution environment

    The video surveillance activity generates a vast amount of data, which can be processed to detect miscreants. The task of identifying and recognizing...

    Nalin Singh, Santosh Singh Rathore, Sandeep Kumar in Multimedia Tools and Applications
    Article 26 April 2022
  17. A chaotic permutation and diffusion based image encryption algorithm for secure communications

    In this digital era, a huge amount of digital data is being generated, transmitted, and stored over the network. Images are widely searched, shared...

    Bhaskar Mondal, Prabhakar Kumar, Shrey Singh in Multimedia Tools and Applications
    Article 05 June 2018
  18. Dimension Estimates for Dynamical Systems with Some Degree of Non-injectivity and Nonsmoothness

    In this chapter dimension estimates for maps and dynamical systems with specific properties are derived. In Sect. 10.1 a class of non-injective...
    Chapter 2021
  19. Securing multimedia videos using space-filling curves

    Securing online multimedia content has become a significant concern in this digital era. Nowadays, several organizations provide premium video...

    Debanjan Sadhya, Santosh Singh Rathore, ... Abhinav Anand in Multimedia Tools and Applications
    Article 26 April 2022
  20. A new RGB image encryption algorithm based on hyper-chaotic-discrete-wavelet-packet-transform

    The paper proposes a new hyper-chaotic-discrete-wavelet-packet-transform encryption algorithm for RGB images. The highlight is that the 512-bit hash...

    Article 21 December 2023
Did you find what you were looking for? Share feedback.