We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,706 results
  1. Designing multi-cavity chaotic maps via multistage step state extension

    Finding a generic method for designing multi-cavity chaotic maps (MCCMs) has been challenging. In this paper, we propose a generic method of...

    Han Bao, Minqi **, ... Bocheng Bao in Nonlinear Dynamics
    Article 08 May 2024
  2. An internal perturbation method to counteract the dynamical degradation of digital chaotic maps and its application

    To address the issue of dynamical degradation in digital chaotic maps, we propose a novel internal perturbation method. In this method, the system...

    Binglun Li, Kehui Sun, ... Wenhao Liu in Nonlinear Dynamics
    Article 11 April 2024
  3. Generation of ideal chaotic sequences by reducing the dynamical degradation of digital chaotic maps

    Chaotic systems have good characteristics, such as sensitivity to initial value and parameter, ergodicity, certainty and so on. Using chaos to...

    Shijie Zhang, Lingfeng Liu in Soft Computing
    Article 22 June 2023
  4. Even symmetric chaotic and skewed maps as a technique in video encryption

    The massive growth and use of digital multimedia through computer networks, including video and images, have increased the demand for protecting this...

    B. M. El-den, Walid A. Raslan, Ahmed A. Abdullah in EURASIP Journal on Advances in Signal Processing
    Article Open access 06 April 2023
  5. A New S-box Generator Algorithm Based on 3D Chaotic Maps and Whale Optimization Algorithm

    Encryption provides security in cases such as storing confidential information or transmitting it over a network. Today, block cipher algorithms are...

    Article 19 April 2023
  6. Few-detail image encryption algorithm based on diffusion and confusion using Henon and Baker chaotic maps

    This paper presents a solution for the security of few-detail images in real-time applications over open or unsecure networks depending on diffusion...

    Ensherah A. Naeem, Anand B. Joshi, ... Fathi E. Abd El-Samie in Soft Computing
    Article 29 January 2024
  7. A Novel Image Encryption Technique Based on DNA Theory and Chaotic Maps

    High inter- and intra-pixel redundancy and correlation among adjoining pixels of digital images make it crucial to secure during transmission over...
    Kartik Verma, Butta Singh, ... Himali Sarangal in Communication and Intelligent Systems
    Conference paper 2024
  8. Linear Methods for Stabilization and Synchronization h-Fractional Chaotic Maps

    In this chapter, we investigate the stabilization and synchronization of different fractional chaotic maps described by the Caputo h-difference...
    Abderrahmane Abbes, Adel Ouannas in State Estimation and Stabilization of Nonlinear Systems
    Chapter 2023
  9. A novel arithmetic optimization algorithm based on chaotic maps for global optimization

    Chaotic maps are effective in develo** evolutionary algorithms (EAs) to avoid local optima and speed convergence. Because of this capability of...

    Salih Berkan Aydemir in Evolutionary Intelligence
    Article 12 March 2022
  10. IESCM: Image Encryption Using Signcryption and Chaotic Maps

    Image encryption is very important in concealing the actual image from third parties by encrypting it with various and efficient algorithms. It also...
    V. Kanchana Devi, E. Umamaheswari, ... Manogna Veena in Information and Communication Technology for Competitive Strategies (ICTCS 2022)
    Conference paper 2023
  11. Reversibly selective encryption for medical images based on coupled chaotic maps and steganography

    The security and confidentiality of medical images are of utmost importance due to frequent issues such as leakage, theft, and tampering during...

    Lina Zhang, **anhua Song, ... Bassem Abd-El-Atty in Complex & Intelligent Systems
    Article Open access 31 October 2023
  12. Construction and application of new high-order polynomial chaotic maps

    Generating pseudorandom numbers with good statistical performance based on chaotic maps has become a topic of interest in chaotic cryptography....

    Hongyan Zang, **nxin Zhao, **nyuan Wei in Nonlinear Dynamics
    Article 03 November 2021
  13. An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems

    The telecare medicine information systems (TMIS) offer a networking channel across public networks to access remote medical services and enable...

    Preecha Yupapin, Chandrashekhar Meshram, ... Muhammad Azeem Akbar in Soft Computing
    Article 14 March 2023
  14. Adaptive Chaotic Maps in Cryptography Applications

    Chaotic cryptography is a promising area for the safe and fast transmission, processing, and storage of data. However, many developed chaos-based...
    Aleksandra Tutueva, Erivelton G. Nepomuceno, ... Denis Butusov in Cybersecurity
    Chapter 2022
  15. Chaotic Maps and Meta-heuristic Algorithms

    In meta-heuristic algorithms, two important stages of exploration and exploitation are considered in order to converge towards optimal answers. In...
    Chapter 2024
  16. Composition of Fuzzy Numbers with Chaotic Maps

    In the research on chaotic systems, which are used for cryptography and secure communication schemes, a key characteristic is the introduction of...
    Nikolaos Charalampidis, Christos Volos, ... Ioannis Stouboulos in Nonlinear Dynamics and Complexity
    Chapter 2022
  17. Chaotic Meta-heuristic Algorithms for Optimal Design of Structures

    In this book, various chaos maps are embedded in eleven efficient and well-known metaheuristics and a significant improvement in the optimization...

    Ali Kaveh, Hossein Yousefpoor in Studies in Computational Intelligence
    Book 2024
  18. Image Encryption Using Chaotic Maps: A Survey

    Images are widely used a data type for sharing information through the Internet. Designing and exploring security mechanisms to protect the image...
    Madhu Sharma, Ranjeet Kumar Ranjan, Vishal Bharti in Soft Computing: Theories and Applications
    Conference paper 2022
  19. Discrete one-dimensional piecewise chaotic systems without fixed points

    This paper presents a new method of generating chaotic maps that do not have fixed points. The method uses an appropriate transformation of functions...

    Marcin Lawnik, Lazaros Moysis, ... Christos Volos in Nonlinear Dynamics
    Article 24 February 2024
  20. An efficient dual-stage pixel-diffusion based multimedia-image encryption using one-type 1D chaotic maps

    Multimedia is an appealing and interactive information representation using a mixture of images, text, audios, and videos. In many cases, people are...

    K Abhimanyu Kumar Patro, Maddikuntla Praveen Kumar, Bibhudendra Acharya in Sādhanā
    Article 12 August 2022
Did you find what you were looking for? Share feedback.