|
|
|
Behrouz Zolfaghari and Takeshi Koshiba
Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption. A comprehensive survey can highlight existing trends and shed light on less...
ver más
|
|
|
|
|
|
|
Yuqiang Dou and Ming Li
Security of image communication is more and more important in many applications such as the transmission of military and medical images. To meet the requirement, a new color image encryption algorithm using a new one-dimension (1D) chaotic map was propos...
ver más
|
|
|
|
|
|
|
Carlos Villaseñor, Eric F. Gutierrez-Frias, Nancy Arana-Daniel, Alma Y. Alanis and Carlos Lopez-Franco
Hyperspectral images (HI) collect information from across the electromagnetic spectrum, and they are an essential tool for identifying materials, recognizing processes and finding objects. However, the information on an HI could be sensitive and must to ...
ver más
|
|
|
|
|
|
|
Iván Felipe Rodríguez Rodríguez, Edilma Isabel Amaya Barrera, Cesar Augusto Suarez Parra, José David Moreno Posada
Pág. 396 - 412
AbstractDownloadsReferencesHow to Cite
|
|
|
|
|
|
|
Edilma Isabel Amaya Barrera, César Augusto Suárez Parra, Rafael Esteban Huérfano Ortiz, José David Moreno Posada, Fabio Andrés Parra Fuentes
Pág. 378 - 390
Abstract AuthorsDownloadsReferencesHow to Cite
|
|
|
|
|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr...
ver más
|
|
|
|
|
|
|
Xiaolong Wang, Haowen Yan and Liming Zhang
Encryption of vector maps, used for copyright protection, is of importance in the community of geographic information sciences. However, some studies adopt one-to-one mapping to scramble vertices and permutate the coordinates one by one according to the ...
ver más
|
|
|
|
|
|
|
Taha Belkhouja, Xiaojiang Du, Amr Mohamed, Abdulla K. Al-Ali and Mohsen Guizani
-
|
|
|
|
|
|
|
Ali Akbar Kekha Javan, Assef Zare, Roohallah Alizadehsani and Saeed Balochian
This paper investigates the robust adaptive synchronization of multi-mode fractional-order chaotic systems (MMFOCS). To that end, synchronization was performed with unknown parameters, unknown time delays, the presence of disturbance, and uncertainty wit...
ver más
|
|
|
|
|
|
|
Jianbin He and Jianping Cai
Over the past century, a tremendous amount of work on the Duffing system has been done with continuous external force, including analytical and numerical solution methods, and the dynamic behavior of physical systems. However, hows does the Duffing oscil...
ver más
|
|
|
|
|
|
|
Partha Sarathi Paul, Anurag Dhungel, Maisha Sadia, Md Razuan Hossain and Md Sakib Hasan
This paper presents a general method, called ?self-parameterization?, for designing one-dimensional (1-D) chaotic maps that provide wider chaotic regions compared to existing 1-D maps. A wide chaotic region is a desirable property, as it helps to provide...
ver más
|
|
|
|
|
|
|
Hayder Najm,Haider K. Hoomod,Rehab Hassan
Pág. pp. 184 - 199
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems...
ver más
|
|
|
|
|
|
|
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo...
ver más
|
|
|
|
|
|
|
Pep Canyelles-Pericas, Paul Anthony Haigh, Zabih Ghassemlooy, Andrew Burton, Xuewu Dai, Tran The Son, Hoa Le-Minh, Richard Binns and Krishna Busawon
Visible Light Communication (VLC) uses light-emitting diodes to provide wireless connectivity in public environments. Transmission security in this emerging channel is not trivial. Chaotic modulation techniques can provide encryption directly in the phys...
ver más
|
|
|
|