Key space
View article
Cosine-transform-based chaotic system for image encryption Open
Chaos is known as a natural candidate for cryptography applications owing to its properties such as unpredictability and initial state sensitivity. However, certain chaos-based cryptosystems have been proven to exhibit various security def…
View article
An image encryption method based on chaos system and AES algorithm Open
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified AES algorithm. In this method, the encryption key is generated by Arnold chaos sequence. Then, the original image…
View article
Color Image Encryption Through Chaos and KAA Map Open
The unprecedented growth in production and exchange of multimedia over unsecured channels is overwhelming mathematicians, scientists and engineers to realize secure and efficient cryptographic algorithms. In this paper, a color image encry…
View article
Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps Open
In recent years, chaos-based image encryption algorithms have aroused extensive research interest. However, some image encryption algorithms still have several security defects, and the research on cryptanalysis is relatively inadequate. T…
View article
Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption Open
Chaos-based image encryption has become a prominent area of research in recent years. In comparison to ordinary chaotic systems, fractional-order chaotic systems tend to have a greater number of control parameters and more complex dynamica…
View article
An Extremely Simple Multiwing Chaotic System: Dynamics Analysis, Encryption Application, and Hardware Implementation Open
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, cre…
View article
A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes Open
In order to improve the security and efficiency of image encryption systems comprehensively, a novel chaotic S-box based image encryption scheme is proposed. Firstly, a new compound chaotic system, Sine-Tent map, is proposed to widen the c…
View article
An Efficient Optimal Key Based Chaos Function for Medical Image Security Open
With the rapid development in the field of medical image encryption, researchers analyzed a number of encryption algorithms based on chaotic systems. But there is a difficulty lies, i.e., small key space and weak security in 1-D chaotic cr…
View article
Generalized double-humped logistic map-based medical image encryption Open
This paper presents the design of the generalized Double Humped (DH) logistic map, used for pseudo-random number key generation (PRNG). The generalized parameter added to the map provides more control on the map chaotic range. A new specia…
View article
A Survey on True Random Number Generators Based on Chaos Open
With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. Random numbers are used in many cryptographic protocols, key management, identity a…
View article
Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs Open
Image encryption is increasingly becoming an important area of research in information security and network communications as digital images are widely used in various applications and are vulnerable to various types of attacks. In this re…
View article
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution Open
Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, …
View article
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution Open
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives riseto data sharing through the Internet. This data transfer via open public networks are susceptible to severaltypes of attacks. Encryption is a method th…
View article
Quantum Image Encryption Scheme Using Arnold Transform and S-box Scrambling Open
The paper proposes a lossless quantum image encryption scheme based on substitution tables (S-box) scrambling, mutation operation and general Arnold transform with keys. First, the key generator builds upon the foundation of SHA-256 hash w…
View article
Pseudo-Random Number Generator Based on Logistic Chaotic System Open
In recent years, a chaotic system is considered as an important pseudo-random source to pseudo-random number generators (PRNGs). This paper proposes a PRNG based on a modified logistic chaotic system. This chaotic system with fixed system …
View article
An Efficient Image Encryption Scheme Based on S-Boxes and Fractional-Order Differential Logistic Map Open
In this work, an efficient image encryption based on S-boxes and fractional-order logistic map is proposed. The features of the fractional-order chaotic system in dynamical behaviors are exhibited. By simulation and comparison with the tra…
View article
DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption Open
Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new form of encryption is proposed based on keys derived f…
View article
A Novel S-Box Design Algorithm Based on a New Compound Chaotic System Open
Substitution-boxes (S-Boxes) are important non-linear components in block cryptosystem, which play an important role in the security of cryptosystems. Constructing S-Boxes with a strong cryptographic feature is an important step in designi…
View article
A Chaos-Based Image Encryption Technique Utilizing Hilbert Curves and H-Fractals Open
Image encryption is the most direct and effective technical means for protecting the security of image information. Based on the space filling property of the Hilbert curve and the infinite property of the H-geometric fractal, a new image …
View article
A novel plaintext-related chaotic image encryption scheme with no additional plaintext information Open
In the latest image chaotic encryption research, more and more encryption schemes associate the key generation mechanism with the plaintext in order to resist the chosen plaintext attack. However, large amounts of the additional data relat…
View article
Providing End-to-End Security Using Quantum Walks in IoT Networks Open
Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on the importance and revolutionize our future. However, the present communication technologies have several security related issue…
View article
Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding Open
In this paper, we construct a five dimensional continuous hyperchaotic system and propose an image encryption scheme based on the hyperchaotic system, which adopts DNA dynamic coding mechanism and classical scrambling diffusion encryption …
View article
Research on digital image encryption algorithm based on double logistic chaotic map Open
With the development of information technology, image information has become the main content of network information transmission. With the development of image encryption technology, it is also about the development of image information t…
View article
Probabilistic shaping based constellation encryption for physical layer security in OFDM RoF system Open
The physical layer security of radio-over-fiber (RoF) system is a very important problem for future communication. In this paper, a novel probabilistic shaping (PS) based constellation encryption scheme is proposed in which two bit-level e…
View article
Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain Open
A novel multiple-image encryption scheme using the nonlinear iterative phase retrieval algorithm in the gyrator transform domain under the illumination of an optical vortex beam is proposed. In order to increase the randomness, the chaotic…
View article
A Chaotic Image Encryption Method Based on the Artificial Fish Swarms Algorithm and the DNA Coding Open
Aiming at the problems of small key space and weak resistance to differential attacks in existing encryption algorithms, we proposed a chaotic digital image encryption scheme based on an optimized artificial fish swarm algorithm and DNA co…
View article
A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture Open
In this paper, a new cryptographic method is proposed, designed for audio files’ security. The encryption algorithm is based on classic symmetric models using pseudo-random number generator composed with chaotic circle map and modified rot…
View article
A Key Space Enhanced Chaotic Encryption Scheme for Physical Layer Security in OFDM-PON Open
In this paper, we propose a key space enhanced chaos-based encryption scheme with no requirement of redundant sideband information in an orthogonal frequency division multiplexing passive optical network (OFDM-PON). For the first time, a s…
View article
Audio Encryption Algorithm Based on Chen Memristor Chaotic System Open
The data space for audio signals is large, the correlation is strong, and the traditional encryption algorithm cannot meet the needs of efficiency and safety. To solve this problem, an audio encryption algorithm based on Chen memristor cha…
View article
Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz Open
In recent years, experts and scholars in the field of information security have attached great importance to the security of image information. They have proposed many image encryption algorithms with higher security. In order to further i…