Zobrazeno 1 - 10
of 13
pro vyhledávání: '"S. J. Sheela"'
Publikováno v:
Journal of Computer Networks and Communications, Vol 2017 (2017)
Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonuclei
Externí odkaz:
https://doaj.org/article/20802eb911cd48f7b9dbb9b4d185b288
Publikováno v:
Multimedia Tools and Applications. 81:40253-40268
Publikováno v:
Multidimensional Systems and Signal Processing. 33:579-595
Publikováno v:
International Journal of Digital Crime and Forensics. 11:43-64
Secured transmission of electrophysiological signals is one of the crucial requirements in telemedicine, telemonitoring, cardiovascular disease diagnosis (CVD) and telecardiology applications. The chaotic systems have good potential in secured transm
Secured transmission of electrophysiological signals is one of the crucial requirements in telemedicine, telemonitoring, cardiovascular disease diagnosis (CVD) and telecardiology applications. The chaotic systems have good potential in secured transm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::27208adfc7c54faf84aa454662385fb1
https://doi.org/10.4018/978-1-7998-7705-9.ch036
https://doi.org/10.4018/978-1-7998-7705-9.ch036
Publikováno v:
SN Computer Science. 1
This article introduces a novel cryptosystem for the protection of medical images which is very essential in teleradiology applications. The proposed cryptosystem is based on Fridrich architecture which uses hyperchaotic cellular neural network (CNN)
Publikováno v:
2020 International Conference for Emerging Technology (INCET).
Blood is an important biological fluid that carries vital nutrients, vitamins, minerals and oxygen to various parts of the body. It helps in actual functioning of the body organs. Blood flow is the amount of blood flowing through arteries or veins of
Publikováno v:
Multimedia Tools and Applications. 77:25223-25251
In this paper, a new two dimensional modified Henon map (2D-MHM) which is derived from Henon map is proposed. Its chaotic performance is analyzed through bifurcation diagram, Lyapunov exponent spectrum and Lyapunov dimension. The map has broad chaoti
Publikováno v:
2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT).
Security is one of the crucial requirements of the multimedia communication which can be achieved by using encryption. Encryption algorithms based on chaos generally satisfy the basic requirements of the cryptosystem such as simplicity, high sensitiv
Publikováno v:
2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET).
Security has become vital issue in storage and transmission of digital data over insecure communication channel which can be achieved by using reliable encryption algorithms. Chaos based encryption techniques are more popular because of their excepti