Zobrazeno 1 - 10
of 4 001
pro vyhledávání: '"Chaotic map"'
Autor:
Mohamed Amine Tahiri, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Mohamed Hammad, Paweł Pławiak, Osama Alfarraj, Ahmed A. Abd El-Latif
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-29 (2024)
Abstract Digital watermarking of images is an essential method for copyright protection and image security. This paper presents an innovative, robust watermarking system for color images based on moment and wavelet transformations, algebraic decompos
Externí odkaz:
https://doaj.org/article/12d8b2a3d5c84e378e0641938717b583
Autor:
Akio Tsuneda
Publikováno v:
Dynamics, Vol 4, Iss 2, Pp 272-286 (2024)
This paper discusses the auto-correlation functions of chaotic binary sequences obtained by a one-dimensional chaotic map and two binary functions. The two binary functions are alternately used to obtain a binary sequence from a chaotic real-valued s
Externí odkaz:
https://doaj.org/article/772de59cde6f41fcb4f4c3375ce0cf36
Autor:
Bowen Zhang, Lingfeng Liu
Publikováno v:
AIMS Mathematics, Vol 9, Iss 1, Pp 99-121 (2024)
While chaotic systems have found extensive applications across diverse scientific domains due to their inherent advantages, they often degrade into cyclic patterns when simulated on hardware with limited computational precision. This results in a pro
Externí odkaz:
https://doaj.org/article/5333a7de972747df9dcfdcef1802dba0
Publikováno v:
IEEE Access, Vol 12, Pp 95871-95883 (2024)
Data confidentiality and security are important issues due to the sensitivity of the data and its relationship with users’ privacy. Sensitive data includes images and texts that can be transmitted over the Internet, Internet of Things devices and e
Externí odkaz:
https://doaj.org/article/e803fe6668374393896b39dac2bd81c4
Publikováno v:
IEEE Access, Vol 12, Pp 83692-83706 (2024)
With the wide application of IoT technologies in the power sector, power IoT faces serious security challenges, which can be severely affected by malicious attacks and unauthorised access. Meanwhile, devices in power IoT are usually resource-constrai
Externí odkaz:
https://doaj.org/article/b102d35ac8434938a74c637b130348ae
Autor:
Phuc-Phan Duong, Hieu Minh Nguyen, Ba-Anh Dao, Binh Kieu-Do-Nguyen, Thai-Ha Tran, Trong-Thuc Hoang, Cong-Kha Pham
Publikováno v:
IEEE Access, Vol 12, Pp 63976-63994 (2024)
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis. This research presents a new approach for constructing lightweight
Externí odkaz:
https://doaj.org/article/e89dc2a6685f42279e7ed8ab035f9343
Publikováno v:
AIMS Energy, Vol 12, Iss 1, Pp 1-30 (2024)
The integration of renewable energy resources (RESs) into the existing power grid is an effective approach to reducing harmful emission content. Environmental economic dispatch is one of the complex constrained optimization problems of power systems.
Externí odkaz:
https://doaj.org/article/4baa13745f904d14a70a65e734fc9102
Autor:
Awais Salman Qazi, Amjad Hussain Zahid, Abdullah Baz, Farrukh Arslan, Mubashir Ali, Jehad Ali
Publikováno v:
IEEE Access, Vol 12, Pp 42725-42736 (2024)
In present-day data communication, the imperative to safeguard information and shield it from a multitude of potential threats and attacks has gained significant prominence. One of the pivotal tools employed in the pursuit of data protection is the d
Externí odkaz:
https://doaj.org/article/bd60750249fd4a0ba4f1204f15a117bd
Publikováno v:
Radioengineering, Vol 32, Iss 4, Pp 583-593 (2023)
In compressive sensing theory, the measurement matrix plays a crucial role in compressive observation of sparse signals. The bipolar Toeplitz measurement matrix constructed based on chaotic map has advantages such as generating fewer free elements an
Externí odkaz:
https://doaj.org/article/bc1baf337ba646ee8919771b4656e79a
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100512- (2024)
The importance of image encryption in cryptography has surged due to advancement in image processing technology. Our research presents a novel image encryption technique using advanced image processing and permutation-based S-box generation. Utilizin
Externí odkaz:
https://doaj.org/article/9bbf31c0452942ba8efa1327b10ede33