Zobrazeno 1 - 10
of 781
pro vyhledávání: '"chaotic encryption"'
Publikováno v:
Circuit World, 2022, Vol. 50, Issue 1, pp. 67-81.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/CW-05-2022-0135
Autor:
Zhiruo Guo, Bo Liu, Jianxin Ren, Qing Zhong, Yaya Mao, Xiangyu Wu, Wenchao Xia, Xiumin Song, Shuaidong Chen, Ying Li, Feng Wang, Yongfeng Wu
Publikováno v:
IEEE Photonics Journal, Vol 16, Iss 5, Pp 1-8 (2024)
This paper proposes a multi-domain multi-level (MDML) orthogonal frequency division multiplexing (OFDM) optical encryption transmission scheme based on memristor Rulkov neuron chaos. In this scheme, the masking factors generated by the memristor Rulk
Externí odkaz:
https://doaj.org/article/2cc6c3692dd6448db26036b38e1bd391
Publikováno v:
IEEE Access, Vol 12, Pp 106720-106734 (2024)
This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel networ
Externí odkaz:
https://doaj.org/article/24c86068bdb14fe78605ac1f59c12881
Publikováno v:
IEEE Access, Vol 12, Pp 73879-73888 (2024)
In the era of digital advancements, safeguarding medical data holds significant importance. This article introduces a novel approach to encrypting images through public-key encryption, incorporating the properties of Elliptic Curve Cryptography (ECC)
Externí odkaz:
https://doaj.org/article/4bbdb33739f746dd829ec8ad11e82f6a
Autor:
Yuzhen Zhou, Erxi Zhu
Publikováno v:
AIMS Mathematics, Vol 9, Iss 3, Pp 5582-5608 (2024)
Chaos theory has been widely utilized in password design, resulting in an encryption algorithm that exhibits strong security and high efficiency. However, rapid advancements in cryptanalysis technology have rendered single system generated sequences
Externí odkaz:
https://doaj.org/article/be18a31357744ac8bb2b4eddd4fa1ac3
Publikováno v:
Mathematical Biosciences and Engineering, Vol 20, Iss 10, Pp 18491-18522 (2023)
The traditional image encryption technology has the disadvantages of low encryption efficiency and low security. According to the characteristics of image information, an image encryption algorithm based on double time-delay chaos is proposed by comb
Externí odkaz:
https://doaj.org/article/dafd6478d83a4269a98d6c714c98de77
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Fan Li, Zhong-Xun Wang
Publikováno v:
Applied Sciences, Vol 14, Iss 11, p 4756 (2024)
In order to effectively protect and verify the copyright information of multimedia digital works, this paper proposes a zero-watermarking algorithm based on carrier image feature point descriptors. The constructed feature matrix of this algorithm con
Externí odkaz:
https://doaj.org/article/cf64a9b589dd4a52b507f1df425a950a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 8, Pp 101660- (2023)
This paper proposes a high-quality color image compression-encryption scheme based on chaos and block permutation. In this scheme, the color digital image is first converted and sampled in the YCbCr gamut, and then the coefficients in the sub-blocks
Externí odkaz:
https://doaj.org/article/1b0ba066c362476a88568d4356493d0d