Academic literature on the topic 'Bit-level scrambling'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bit-level scrambling.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Bit-level scrambling"

1

Liu, Rui. "A New Chaotic Image Scrambling Scheme Based on Spatial Bit-Level Map." Applied Mechanics and Materials 220-223 (November 2012): 2589–94. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2589.

Full text
Abstract:
Image scrambling is an important technique in digital image encryption and digital image watermarking. This paper proposes a new image scrambling algorithm based on chaotic sequence and spatial bit-level map. First, I used Logistic chaotic sequences to rearrange digital image pixels into one-dimensional (1-D) sequence, then the value of each pixel in the sequence was decomposed into k-bits which constituted a two-dimensional (2-D) bit matrix. Second, the spatial bit-level map was performed in the 2-D bit matrix to generate pixels with new values. Finally, the scrambling image was generated acc
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Shuliang. "A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling." IEEE Photonics Journal 10, no. 2 (2018): 1–14. http://dx.doi.org/10.1109/jphot.2018.2817550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Shuqin, Congxu Zhu, and Hanyu Yan. "Cryptanalyzing and Improving an Image Encryption Algorithm Based on Chaotic Dual Scrambling of Pixel Position and Bit." Entropy 25, no. 3 (2023): 400. http://dx.doi.org/10.3390/e25030400.

Full text
Abstract:
An image encryption algorithm for the double scrambling of the pixel position and bit was cryptanalyzed. In the original image encryption algorithm, the positions of pixels were shuffled totally with the chaotic sequence. Then, the 0 and 1-bit positions of image pixels were scrambled through the use of another chaotic sequence generated by the input key. The authors claimed that the algorithm was able to resist the chosen-plaintext attack. However, through the analysis of the encryption algorithm, it was found that the equivalent key of the whole encryption algorithm was the scrambling sequenc
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Chun-Lai, Yang Zhou, Hong-Min Li, Wei Feng, and Jian-Rong Du. "Image encryption scheme with bit-level scrambling and multiplication diffusion." Multimedia Tools and Applications 80, no. 12 (2021): 18479–501. http://dx.doi.org/10.1007/s11042-021-10631-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siddartha, B. K., and G. K. Ravikumar. "An efficient data masking for securing medical data using DNA encoding and chaotic system." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6008–18. https://doi.org/10.11591/ijece.v10i6.pp6008-6018.

Full text
Abstract:
Data security is of utmost importance for ubiquitous computing of medical/diagnostic data or images. Along with that must consider preserving the privacy of patients. Recently, deoxyribose nucleic acid (DNA) sequences and CSs are jointly used for building efficient data masking models. However, the state-of-art method is not robust against cropping attack (CA) and noise. Since in the existing model most of the digits of each pixel are not changed. This work represents efficient-data-masking (EDM) using chaos and the DNA based encryption technique for securing the healthcaredata. For overcoming
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmed, Kamil Hasan Al-Ali, and Mohammed Daif Alkhasraji Jafaar. "Colour image encryption based on hybrid bit-level scrambling, ciphering, and public key cryptography." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1607~1619. https://doi.org/10.11591/eei.v12i3.4728.

Full text
Abstract:
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaotic maps. In the first scenario, bit-level scrambling (BLS) using a 2D coupled chaotic map (2D-CCM) is used to encrypt the bits of the basic colour image. In the second strategy, the scrambled bit level is XORed with pseudo random bit generator (PRBG). The PRBG is designed using a combination of chaotic maps, including, logistic map (LM), sine map (SM), 5D chaotic map (5D-CM), enhanced quadratic map (EQM), and 2D henon SM (2D-HSM). The pubic key based on the Chebyshev polynomial chaotic map is us
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Ali, Ahmed Kamil Hasan, and Jafaar Mohammed Daif Alkhasraji. "Colour image encryption based on hybrid bit-level scrambling, ciphering, and public key cryptography." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1607–19. http://dx.doi.org/10.11591/eei.v12i3.4728.

Full text
Abstract:
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaotic maps. In the first scenario, bit-level scrambling (BLS) using a 2D coupled chaotic map (2D-CCM) is used to encrypt the bits of the basic colour image. In the second strategy, the scrambled bit level is XORed with pseudo random bit generator (PRBG). The PRBG is designed using a combination of chaotic maps, including, logistic map (LM), sine map (SM), 5D chaotic map (5D-CM), enhanced quadratic map (EQM), and 2D henon SM (2D-HSM). The pubic key based on the Chebyshev polynomial chaotic map is us
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Ting, Bin Ge, Chenxing Xia, and Gaole Dai. "Multi-Image Encryption Algorithm Based on Cascaded Modulation Chaotic System and Block-Scrambling-Diffusion." Entropy 24, no. 8 (2022): 1053. http://dx.doi.org/10.3390/e24081053.

Full text
Abstract:
To address the problem of a poor security image encryption algorithm based on a single chaotic map, this paper proposes a cascade modulation chaotic system (CMCS) that can generate multiple chaotic maps. On this basis, a multi-image encryption algorithm with block-scrambling-diffusion is proposed using CMCS. The algorithm makes full use of the features of CMCS to achieve the effect of one encryption at a time for images. Firstly, the key-value associated with the plaintexts is generated using a secure hash algorithm-512 (SHA-512) operation and random sequence, and the three images are fully co
APA, Harvard, Vancouver, ISO, and other styles
9

Butt, Khushbu Khalid, Guohui Li, Sajid Khan, and Sohaib Manzoor. "Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD." Entropy 22, no. 1 (2020): 112. http://dx.doi.org/10.3390/e22010112.

Full text
Abstract:
Bit-level and pixel-level methods are two classifications for image encryption, which describe the smallest processing elements manipulated in diffusion and permutation respectively. Most pixel-level permutation methods merely alter the positions of pixels, resulting in similar histograms for the original and permuted images. Bit-level permutation methods, however, have the ability to change the histogram of the image, but are usually not preferred due to their time-consuming nature, which is owed to bit-level computation, unlike that of other permutation techniques. In this paper, we introduc
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Wanbo, and Hao Wang. "Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption." Modern Physics Letters B 35, no. 24 (2021): 2150406. http://dx.doi.org/10.1142/s0217984921504066.

Full text
Abstract:
Chaotic map is applied to numerous research fields, such as encryption of data and information. In this paper, a novel bit-level scrambling encryption based on three-dimensional trigonometric chaotic sequence is proposed. This encryption is operated on grayscale images because pixel value of which is between 0 and 255, which can be converted into 8-bit binary number, then each image can be converted into eight binary images. Combine binary images a three-dimensional matrix as input, which have three index values width, height, and page. Generate three numbers by the chaotic sequence to locate
APA, Harvard, Vancouver, ISO, and other styles
More sources

Conference papers on the topic "Bit-level scrambling"

1

Ping, Ping, Feng Xu, Md Shaiful Islam Babu, Xin Lv, and Yingchi Mao. "Image Scrambling Scheme Based on Bit-Level Permutation and 2-D Cellular Automata." In 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2015. http://dx.doi.org/10.1109/iih-msp.2015.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ye, Ruisong, Jiebin Su, Yuhan Tang, Haoran Li, and Haoyu Zhi. "A Novel Chaotic Image Encryption Algorithm Based on Pixel and Bit Level Scrambling-diffusion." In 2022 7th International Conference on Cyber Security and Information Engineering (ICCSIE). IEEE, 2022. http://dx.doi.org/10.1109/iccsie56462.2022.00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sheikh, Javaid Ahmad, Uzma, Shabir A. Parah, and G. Mohiuddin Bhat. "Bit Error Rate (BER) improvement of Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) system using bit level scrambling." In 2015 Annual IEEE India Conference (INDICON). IEEE, 2015. http://dx.doi.org/10.1109/indicon.2015.7443308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!