• No results found

Chaotic Encryption

Research on neural network chaotic encryption algorithm in wireless network security communication

Research on neural network chaotic encryption algorithm in wireless network security communication

... password encryption, and decryption efficiency ...network chaotic encryption al- gorithm [10–12] mainly utilizes the basic features of mixing, strong sensitivity to parameters and initial values in ...

10

Compressive and Progressive Multi Key
Chaotic Encryption

Compressive and Progressive Multi Key Chaotic Encryption

... combined encryption and compression process provides an optimized and efficient way for image ...Many chaotic based image encryption schemes have been proposed for both single key and multi key ...

8

Secure Biometric Authentication System using Chaotic Encryption

Secure Biometric Authentication System using Chaotic Encryption

... on chaotic encryption which has extreme sensibility on initial conditions with confusion and ergodicity with diffusion is presented by using the logistic map and Murillo-Escobar’s ...

6

An Arbitrated Quantum Signature Scheme Based on  Chaotic Quantum Encryption Algorithm

An Arbitrated Quantum Signature Scheme Based on Chaotic Quantum Encryption Algorithm

... an AQS scheme based on the improved quantum chaotic encryption algorithm. It involves three participants, in- cluding the signatory, the receiver and the arbitrator, in three phases, i.e., initializing ...

6

INTERACTING THROUGH DISCLOSING: PEER INTERACTION PATTERNS BASED ON 
SELF DISCLOSURE LEVELS VIA FACEBOOK

INTERACTING THROUGH DISCLOSING: PEER INTERACTION PATTERNS BASED ON SELF DISCLOSURE LEVELS VIA FACEBOOK

... for encryption turns out to be an urgent need and the chaos theory grows until it is approved by the cryptographers of the time until the ...in Chaotic cryptography in chaotic cryptography was ...

13

Research on digital image encryption algorithm based on double logistic chaotic map

Research on digital image encryption algorithm based on double logistic chaotic map

... image encryption. The pseudorandom signal generated by the chaotic system has the characteristics of high initial sensitivity, randomness, and ...the encryption system. Therefore, the ...

10

Image encryption algorithm based on chaotic mapping

Image encryption algorithm based on chaotic mapping

... Chaos encryption has been researched since the last ...chaos encryption in secure communication as well as in optical data ...several chaotic image encryption algorithms that have been ...some ...

12

Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption

Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption

... efficiency, so its key space is smaller and the system complexity is lower, which results in a lower security protection. Due to more state variables in a hyperchaotic system, a high-dimensional chaotic system has ...

5

Image Encryption Algorithm Based on a Chaotic Iterative Process

Image Encryption Algorithm Based on a Chaotic Iterative Process

... an encryption algorithm which is able to deal efficiently with any type of input ...The encryption key corresponds to the set of seeds values used by the chaotic ...the chaotic function and ...

11

A Review Paper on Chaotic Map Image Encryption Techniques

A Review Paper on Chaotic Map Image Encryption Techniques

... Lalita Gupta, Rahul Gupta and Manoj Sharma proposed an encryption scheme which targeted on disquieting the correlation among image pixels. They used pixel shuffler horizontally as well as vertically, 2D bakers map ...

5

Analysis of Chaotic Image Encryption based on DPFrFT and Biokeys

Analysis of Chaotic Image Encryption based on DPFrFT and Biokeys

... Nonlinear Chaotic Map (1D/2D/3D) and to get the feature ...proposed encryption technique, i.e. initial seed for Nonlinear Chaotic Map (1D/2D/3D), transform orders and angles are ...the ...

6

IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC SCHEMES: A REVIEW

IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC SCHEMES: A REVIEW

... Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee, and SmJmng Kim[16] proposed the multi level image encryption by using binary phase exclusive OR operation and image dividing technique. The multi level image ...

5

Cellular Automata and Chaotic Maps for Speech Signal Encryption

Cellular Automata and Chaotic Maps for Speech Signal Encryption

... of chaotic system and cellular automata (dynamic , nonlinear ,sensitivity to initial conditions, topological transitivity with iterative process) make the speech signal difficult to decrypt and more ...

8

An Improved Image Encryption Algorithm based on Chaotic System

An Improved Image Encryption Algorithm based on Chaotic System

... the chaotic maps have attracted the attention of cryptographers to develop new encryption algorithms with higher security and ...image encryption scheme which utilizes two chaotic logistic ...

10

Video Encryption Based on Chaotic Systems in the Compression Domain

Video Encryption Based on Chaotic Systems in the Compression Domain

... video encryption techniques have been proposed in the past ...While encryption standard algorithms like AES (Advanced Encryption Standard) or DES (Data Encryption Standard) can be used to ...

5

Robust Image Encryption Technique using Fusion of Chaotic maps

Robust Image Encryption Technique using Fusion of Chaotic maps

... Image encryption scheme is implemented in three stages ...of encryption and therefore we go for a double map ...the encryption scheme, the logistic and skew tent maps were fused (combine) in ...

9

A Novel Image Encryption Algorithm Based on Bernoulli Maps

A Novel Image Encryption Algorithm Based on Bernoulli Maps

... The following experimental results are presented to demonstrate the efficiency of the proposed image encryption algorithm. The standard gray scale image Lenna (Fig. 2(a)) with the size 256 × 256 pixels is used for ...

5

Triple Image Encryption using Chaotic Maps and DNA Sequences

Triple Image Encryption using Chaotic Maps and DNA Sequences

... A This paper proposed for triple images based on chaotic sequences with Deoxyribonulcie acid (DNA) rules and its operations with excellent performance. Firstly, SHA256 hash value of combination plain images one ...

5

Novel Image Encryption Algorithm Based on Chaotic Map and Encoding

Novel Image Encryption Algorithm Based on Chaotic Map and Encoding

... Recently, other techniques, such as DNA encoding, have been employed to encipher images. In this approach, the pixels of plain image are substituted for DNA sequences. Jain and Rajpal [11] have proposed an image ...

6

Multi-Image Encryption Technique Based on Permutation of Chaotic System

Multi-Image Encryption Technique Based on Permutation of Chaotic System

... that chaotic dynamical systems encounter Lyapunov exponential function they will continue stabilized in chaos ...an encryption system to have proper speed to be able to cipher an image of enormous ...text ...

10

Show all 4353 documents...

Related subjects