Zobrazeno 1 - 10
of 5 104
pro vyhledávání: '"Logistic Map"'
Publikováno v:
AIMS Mathematics, Vol 9, Iss 11, Pp 31217-31238 (2024)
In modern air defense systems, safeguarding sensitive information is crucial to prevent unauthorized access and cyber-attacks. Here, we present an innovative image encryption approach, leveraging chaotic logistic maps and hyperchaotic Folded Towel Ma
Externí odkaz:
https://doaj.org/article/ce36608e4c214b2d956e80194e2e8445
Publikováno v:
Mağallaẗ Al-kūfaẗ Al-handasiyyaẗ, Vol 15, Iss 4, Pp 55-64 (2024)
Encryption is crucial because of how integral to daily life things like smartphones, computers, and the internet have become. It's almost inconceivable to think about getting by without it. Everything from paying bills and buying goods to email and s
Externí odkaz:
https://doaj.org/article/7904df4cbbcd4736b7ba186bae620281
Autor:
Bo-Wen Shen
Publikováno v:
Encyclopedia, Vol 4, Iss 3, Pp 1134-1146 (2024)
This entry examines Lorenz’s error growth models with quadratic and cubic hypotheses, highlighting their mathematical connections to the non-dissipative Lorenz 1963 model. The quadratic error growth model is the logistic ordinary differential equat
Externí odkaz:
https://doaj.org/article/990a797e4c0f4fcdae4bf0e4fa7a7467
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-28 (2024)
Abstract This research paper investigates discrete predator-prey dynamics with two logistic maps. The study extensively examines various aspects of the system’s behavior. Firstly, it thoroughly investigates the existence and stability of fixed poin
Externí odkaz:
https://doaj.org/article/f35c5abb25384c558f35579288f32d66
Publikováno v:
Jurnal Nasional Teknik Elektro dan Teknologi Informasi, Vol 13, Iss 2, Pp 93-100 (2024)
Face recognition uses biometric technologies to identify humans based on their facial characteristics. This method is commonly used to restrict information access control. The benefits of face recognition systems encompass their ease of use and secur
Externí odkaz:
https://doaj.org/article/0c85796051d54d6ab62c03498d648766
Publikováno v:
IEEE Access, Vol 12, Pp 4825-4844 (2024)
In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due to its ability to generate random and unpredictable sequences of numbers. The CLMK algorithm uses the chaotic logistic map to generate a key stream, wh
Externí odkaz:
https://doaj.org/article/e949f2bafca1494b9be9f9524084d909
Autor:
B. Sakthi Kumar, R. Revathi
Publikováno v:
Journal of Engineering and Applied Science, Vol 71, Iss 1, Pp 1-24 (2024)
Abstract In the last few years, multimedia technology has made tremendous strides. These days, the Web is frequently used to transfer multimedia content, including audio, video, and photos. However, the Internet is a very vulnerable medium with many
Externí odkaz:
https://doaj.org/article/dc45f777936c458f8d10b56075ecec47
Publikováno v:
Mathematics, Vol 12, Iss 23, p 3635 (2024)
Thedivergence from the unstable fixed point of the fractional difference logistic map is investigated in this paper. In contrary to the classical logistic map, the memory horizon of the fractional difference logistic map reaches the initial condition
Externí odkaz:
https://doaj.org/article/70dacd159bb14504b531c2494468d06e
Publikováno v:
IEEE Access, Vol 12, Pp 123401-123422 (2024)
In the current era of digital communication, image security is a top priority as sending images, which often contain personal or confidential information, over the Internet poses security risks. Many encryption algorithms have been proposed in the li
Externí odkaz:
https://doaj.org/article/7c1cceb8355a4757a22f41d88172b7d7
Publikováno v:
IEEE Access, Vol 12, Pp 123694-123715 (2024)
The secrecy of various forms of multimedia data constitutes a significant aspect of the cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image encryption has been investigated in the literature using different tran
Externí odkaz:
https://doaj.org/article/e91d350127c04f16aa345a6f3d9eaef5