To see the other types of publications on this topic, follow the link: Bit-level scrambling.

Journal articles on the topic 'Bit-level scrambling'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Bit-level scrambling.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Rui. "A New Chaotic Image Scrambling Scheme Based on Spatial Bit-Level Map." Applied Mechanics and Materials 220-223 (November 2012): 2589–94. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2589.

Full text
Abstract:
Image scrambling is an important technique in digital image encryption and digital image watermarking. This paper proposes a new image scrambling algorithm based on chaotic sequence and spatial bit-level map. First, I used Logistic chaotic sequences to rearrange digital image pixels into one-dimensional (1-D) sequence, then the value of each pixel in the sequence was decomposed into k-bits which constituted a two-dimensional (2-D) bit matrix. Second, the spatial bit-level map was performed in the 2-D bit matrix to generate pixels with new values. Finally, the scrambling image was generated acc
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Shuliang. "A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling." IEEE Photonics Journal 10, no. 2 (2018): 1–14. http://dx.doi.org/10.1109/jphot.2018.2817550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Shuqin, Congxu Zhu, and Hanyu Yan. "Cryptanalyzing and Improving an Image Encryption Algorithm Based on Chaotic Dual Scrambling of Pixel Position and Bit." Entropy 25, no. 3 (2023): 400. http://dx.doi.org/10.3390/e25030400.

Full text
Abstract:
An image encryption algorithm for the double scrambling of the pixel position and bit was cryptanalyzed. In the original image encryption algorithm, the positions of pixels were shuffled totally with the chaotic sequence. Then, the 0 and 1-bit positions of image pixels were scrambled through the use of another chaotic sequence generated by the input key. The authors claimed that the algorithm was able to resist the chosen-plaintext attack. However, through the analysis of the encryption algorithm, it was found that the equivalent key of the whole encryption algorithm was the scrambling sequenc
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Chun-Lai, Yang Zhou, Hong-Min Li, Wei Feng, and Jian-Rong Du. "Image encryption scheme with bit-level scrambling and multiplication diffusion." Multimedia Tools and Applications 80, no. 12 (2021): 18479–501. http://dx.doi.org/10.1007/s11042-021-10631-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siddartha, B. K., and G. K. Ravikumar. "An efficient data masking for securing medical data using DNA encoding and chaotic system." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6008–18. https://doi.org/10.11591/ijece.v10i6.pp6008-6018.

Full text
Abstract:
Data security is of utmost importance for ubiquitous computing of medical/diagnostic data or images. Along with that must consider preserving the privacy of patients. Recently, deoxyribose nucleic acid (DNA) sequences and CSs are jointly used for building efficient data masking models. However, the state-of-art method is not robust against cropping attack (CA) and noise. Since in the existing model most of the digits of each pixel are not changed. This work represents efficient-data-masking (EDM) using chaos and the DNA based encryption technique for securing the healthcaredata. For overcoming
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmed, Kamil Hasan Al-Ali, and Mohammed Daif Alkhasraji Jafaar. "Colour image encryption based on hybrid bit-level scrambling, ciphering, and public key cryptography." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1607~1619. https://doi.org/10.11591/eei.v12i3.4728.

Full text
Abstract:
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaotic maps. In the first scenario, bit-level scrambling (BLS) using a 2D coupled chaotic map (2D-CCM) is used to encrypt the bits of the basic colour image. In the second strategy, the scrambled bit level is XORed with pseudo random bit generator (PRBG). The PRBG is designed using a combination of chaotic maps, including, logistic map (LM), sine map (SM), 5D chaotic map (5D-CM), enhanced quadratic map (EQM), and 2D henon SM (2D-HSM). The pubic key based on the Chebyshev polynomial chaotic map is us
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Ali, Ahmed Kamil Hasan, and Jafaar Mohammed Daif Alkhasraji. "Colour image encryption based on hybrid bit-level scrambling, ciphering, and public key cryptography." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1607–19. http://dx.doi.org/10.11591/eei.v12i3.4728.

Full text
Abstract:
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaotic maps. In the first scenario, bit-level scrambling (BLS) using a 2D coupled chaotic map (2D-CCM) is used to encrypt the bits of the basic colour image. In the second strategy, the scrambled bit level is XORed with pseudo random bit generator (PRBG). The PRBG is designed using a combination of chaotic maps, including, logistic map (LM), sine map (SM), 5D chaotic map (5D-CM), enhanced quadratic map (EQM), and 2D henon SM (2D-HSM). The pubic key based on the Chebyshev polynomial chaotic map is us
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Ting, Bin Ge, Chenxing Xia, and Gaole Dai. "Multi-Image Encryption Algorithm Based on Cascaded Modulation Chaotic System and Block-Scrambling-Diffusion." Entropy 24, no. 8 (2022): 1053. http://dx.doi.org/10.3390/e24081053.

Full text
Abstract:
To address the problem of a poor security image encryption algorithm based on a single chaotic map, this paper proposes a cascade modulation chaotic system (CMCS) that can generate multiple chaotic maps. On this basis, a multi-image encryption algorithm with block-scrambling-diffusion is proposed using CMCS. The algorithm makes full use of the features of CMCS to achieve the effect of one encryption at a time for images. Firstly, the key-value associated with the plaintexts is generated using a secure hash algorithm-512 (SHA-512) operation and random sequence, and the three images are fully co
APA, Harvard, Vancouver, ISO, and other styles
9

Butt, Khushbu Khalid, Guohui Li, Sajid Khan, and Sohaib Manzoor. "Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD." Entropy 22, no. 1 (2020): 112. http://dx.doi.org/10.3390/e22010112.

Full text
Abstract:
Bit-level and pixel-level methods are two classifications for image encryption, which describe the smallest processing elements manipulated in diffusion and permutation respectively. Most pixel-level permutation methods merely alter the positions of pixels, resulting in similar histograms for the original and permuted images. Bit-level permutation methods, however, have the ability to change the histogram of the image, but are usually not preferred due to their time-consuming nature, which is owed to bit-level computation, unlike that of other permutation techniques. In this paper, we introduc
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Wanbo, and Hao Wang. "Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption." Modern Physics Letters B 35, no. 24 (2021): 2150406. http://dx.doi.org/10.1142/s0217984921504066.

Full text
Abstract:
Chaotic map is applied to numerous research fields, such as encryption of data and information. In this paper, a novel bit-level scrambling encryption based on three-dimensional trigonometric chaotic sequence is proposed. This encryption is operated on grayscale images because pixel value of which is between 0 and 255, which can be converted into 8-bit binary number, then each image can be converted into eight binary images. Combine binary images a three-dimensional matrix as input, which have three index values width, height, and page. Generate three numbers by the chaotic sequence to locate
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Yu, Liquan Chen, Kunliang Yu, Yuan Gao, and Yang Ma. "An Image Encryption Scheme Based on Logistic Quantum Chaos." Entropy 24, no. 2 (2022): 251. http://dx.doi.org/10.3390/e24020251.

Full text
Abstract:
This paper proposes an image encryption scheme based on logistic quantum chaos. Firstly, we use compressive sensing algorithms to compress plaintext images and quantum logistic and Hadamard matrix to generate the measurement matrix. Secondly, the improved flexible representation of the quantum images (FRQI) encoding method is utilized for encoding the compressed image. The pixel value scrambling operation of the encoded image is realized by rotating the qubit around the axis. Finally, the quantum pixel is encoded into the pixel value in the classical computer, and the bit-level diffusion and s
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Lei, Wenjun Song, Jiali Di, Xuncai Zhang, and Chengye Zou. "Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling." Entropy 27, no. 1 (2025): 84. https://doi.org/10.3390/e27010084.

Full text
Abstract:
With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers. Subsequently, four innovative bit-level scrambling strategies are employed to enhance encryption strength. To further impr
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Xiaoqiang, Mi Liu, Jingxi Tian, and Zhengjun Gong. "Color Image Encryption Algorithm Based on Dynamic Block Zigzag Transformation and Six-Sided Star Model." Electronics 11, no. 16 (2022): 2512. http://dx.doi.org/10.3390/electronics11162512.

Full text
Abstract:
As a result of the rise in network technology, information security has become particularly important. Digital images play an important role in network transmission. To improve their security and efficiency, a new color image encryption algorithm is proposed. The proposed algorithm adopts a classical scrambling–diffusion framework. In the scrambling stage, the dynamic block Zigzag transformation is designed by combining the chaotic sequence with the standard Zigzag transformation, which can dynamically select the transformation range and the number of times. It is used to scramble the pixel po
APA, Harvard, Vancouver, ISO, and other styles
14

Wu, Jiang, Jiayi Shi, and Taiyong Li. "A Novel Image Encryption Approach Based on a Hyperchaotic System, Pixel-Level Filtering with Variable Kernels, and DNA-Level Diffusion." Entropy 22, no. 1 (2019): 5. http://dx.doi.org/10.3390/e22010005.

Full text
Abstract:
With the rapid growth of image transmission and storage, image security has become a hot topic in the community of information security. Image encryption is a direct way to ensure image security. This paper presents a novel approach that uses a hyperchaotic system, Pixel-level Filtering with kernels of variable shapes and parameters, and DNA-level Diffusion, so-called PFDD, for image encryption. The PFDD totally consists of four stages. First, a hyperchaotic system is applied to generating hyperchaotic sequences for the purpose of subsequent operations. Second, dynamic filtering is performed o
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Yong, Shucui Xie, and Jianzhong Zhang. "A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map." Entropy 24, no. 2 (2022): 287. http://dx.doi.org/10.3390/e24020287.

Full text
Abstract:
A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensional Henon map. The improved Henon map is called 2D-ICHM, and its chaotic performance is analyzed. Compared with some existing chaotic maps, 2D-ICHM has larger parameter space, continuous chaotic range, and more complex dynamic behavior. Second, an image encryption structure based on diffusion–scrambling–diffusion and spatial domain–frequency domai
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Ling, Qiwen Ran, and Junrong Ding. "Image Encryption Using Quantum 3D Mobius Scrambling and 3D Hyper-Chaotic Henon Map." Entropy 25, no. 12 (2023): 1629. http://dx.doi.org/10.3390/e25121629.

Full text
Abstract:
In encryption technology, image scrambling is a common processing operation. This paper proposes a quantum version of the 3D Mobius scrambling transform based on the QRCI model, which changes not only the position of pixels but also the gray values. The corresponding quantum circuits are devised. Furthermore, an encryption scheme combining the quantum 3D Mobius transform with the 3D hyper-chaotic Henon map is suggested to protect the security of image information. To facilitate subsequent processing, the RGB color image is first represented with QRCI. Then, to achieve the pixel-level permutati
APA, Harvard, Vancouver, ISO, and other styles
17

Lv, Xiupin, Xiaofeng Liao, and Bo Yang. "Bit-level plane image encryption based on coupled map lattice with time-varying delay." Modern Physics Letters B 32, no. 10 (2018): 1850124. http://dx.doi.org/10.1142/s0217984918501245.

Full text
Abstract:
Most of the existing image encryption algorithms had two basic properties: confusion and diffusion in a pixel-level plane based on various chaotic systems. Actually, permutation in a pixel-level plane could not change the statistical characteristics of an image, and many of the existing color image encryption schemes utilized the same method to encrypt R, G and B components, which means that the three color components of a color image are processed three times independently. Additionally, dynamical performance of a single chaotic system degrades greatly with finite precisions in computer simul
APA, Harvard, Vancouver, ISO, and other styles
18

Patel, Sakshi, and Thanikaiselvan Veeramalai. "Image Encryption Using a Spectrally Efficient Halton Logistics Tent (HaLT) Map and DNA Encoding for Secured Image Communication." Entropy 24, no. 6 (2022): 803. http://dx.doi.org/10.3390/e24060803.

Full text
Abstract:
With the advancement of technology worldwide, security is essential for online information and data. This research work proposes a novel image encryption method based on combined chaotic maps, Halton sequence, five-dimension (5D) Hyper-Chaotic System and Deoxyribonucleic Acid (DNA) encoding. Halton sequence is a known low-discrepancy sequence having uniform distribution in space for application in numerical methods. In the proposed work, we derived a new chaotic map (HaLT map) by combining chaotic maps and Halton sequence to scramble images for cryptography applications. First level scrambling
APA, Harvard, Vancouver, ISO, and other styles
19

Huang, Li, Cong Ding, Zhenjie Bao, Haitao Chen, and Changsheng Wan. "A DNA Encoding Image Encryption Algorithm Based on Chaos." Mathematics 13, no. 8 (2025): 1330. https://doi.org/10.3390/math13081330.

Full text
Abstract:
With the development of society and the Internet, images have become an important medium for information exchange. To improve the security of image encryption and transmission, a new image encryption algorithm based on bit-plane decomposition, DNA encoding and the 5D Hamiltonian conservative chaotic system is proposed. This encryption scheme is different from the traditional scrambling and diffusion methods at the level of image spatial pixels but encodes images into DNA strands and completely scrambles and diffuses operations on the DNA strands to ensure the security of images and improve the
APA, Harvard, Vancouver, ISO, and other styles
20

Geng, Shengtao, Jiahao Li, Xuncai Zhang, and Yanfeng Wang. "An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding." Entropy 25, no. 8 (2023): 1178. http://dx.doi.org/10.3390/e25081178.

Full text
Abstract:
As an effective method for image security protection, image encryption is widely used in data hiding and content protection. This paper proposes an image encryption algorithm based on an improved Hilbert curve with DNA coding. Firstly, the discrete wavelet transform (DWT) decomposes the plaintext image by three-level DWT to obtain the high-frequency and low-frequency components. Secondly, different modes of the Hilbert curve are selected to scramble the high-frequency and low-frequency components. Then, the high-frequency and low-frequency components are reconstructed separately using the inve
APA, Harvard, Vancouver, ISO, and other styles
21

Jana, Sunit. "A Review paper of Least Significant Bit (LSB) based steganography with encryption." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem51003.

Full text
Abstract:
n the age of pervasive digital communication, ensuring the confidentiality of sensitive information has become increasingly vital. Image steganography, particularly techniques based on Least Significant Bit (LSB) manipulation, offers a covert channel for data hiding. However, classical LSB methods lack robustness and are vulnerable to various attacks. This research presents a comparative and consolidated study of advanced LSB-based image steganography techniques enhanced with cryptographic mechanisms such as Huffman Coding, Triple DES (3DES), Multi-Level Encryption (MLE), and MD5 hashing. A no
APA, Harvard, Vancouver, ISO, and other styles
22

M., Ganavi, and Prabhudeva S. "Two-Layer Security of Images Using Elliptic Curve Cryptography with Discrete Wavelet Transform." International Journal of Computer Network and Information Security 15, no. 2 (2023): 31–47. http://dx.doi.org/10.5815/ijcnis.2023.02.03.

Full text
Abstract:
Information security is an important part of the current interactive world. It is very much essential for the end-user to preserve the confidentiality and integrity of their sensitive data. As such, information encoding is significant to defend against access from the non-authorized user. This paper is presented with an aim to build a system with a fusion of Cryptography and Steganography methods for scrambling the input image and embed into a carrier media by enhancing the security level. Elliptic Curve Cryptography (ECC) is helpful in achieving high security with a smaller key size. In this
APA, Harvard, Vancouver, ISO, and other styles
23

Shilpa M. Satre. "Quantum Image Cryptography of Continuous Chaotic Maps by Using Pixel Shuffeling." Journal of Electrical Systems 20, no. 5s (2024): 463–76. http://dx.doi.org/10.52783/jes.2073.

Full text
Abstract:
Images are important data carriers because, compared to text data, they are harder to transfer or store securely and include higher volumes and redundancies of digital data. Images can be shielded against a variety of risks with security, including eavesdropping and illegal copying and alteration. Because of the potential quantum risk to the existing cryptographic encryption methods and the quick advancement towards the development of quantum computers, quantum image encryption algorithms have recently drawn increasing amounts of attention. The majority of quantum image encryption techniques s
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Jie, and Lingfeng Liu. "A Novel Chaos-Based Image Encryption Using Magic Square Scrambling and Octree Diffusing." Mathematics 10, no. 3 (2022): 457. http://dx.doi.org/10.3390/math10030457.

Full text
Abstract:
Digital chaotic maps have been widely used in the fields of cryptography owing to their dynamic characteristics, however, some unfavorable security properties arise when they operate on devices with limited precision. Thus, enhancing the properties of chaotic maps are beneficial to the improvement of chaos-based encryption algorithms. In this paper, a scheme to integrate a one-dimensional Logistic map by perturbation parameters with a delayed coupling method and feedback control is proposed and further deepens the randomness by selectively shifting the position of the chaotic sequence. Then, t
APA, Harvard, Vancouver, ISO, and other styles
25

Cao, Yuan, and Yinglei Song. "Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems." Entropy 26, no. 7 (2024): 597. http://dx.doi.org/10.3390/e26070597.

Full text
Abstract:
Encryption of images is an important method that can effectively improve the security and privacy of crucial image data. Existing methods generally encrypt an image with a combination of scrambling and encoding operations. Currently, many applications require highly secure results for image encryption. New methods that can achieve improved randomness for both the scrambling and encoding processes in encryption are thus needed to further enhance the security of a cipher image. This paper proposes a new method that can securely encrypt color images. As the first step of the proposed method, a co
APA, Harvard, Vancouver, ISO, and other styles
26

Agrawal, Sushama, and Anjali Bhalchandra. "Firefly optimized robust, imperceptible, secure watermarking scheme." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1155. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp1155-1163.

Full text
Abstract:
A multi-objective optimized hybrid image watermarking technique is being proposed considering robustness, imperceptibility and security aspects using two different scaling factors. In this technique, original image is subjected to third level lifting wavelet transform (LWT) followed by singular value decomposition (SVD). Watermark is split into two parts to embed each of them into a different subband. In the suggested scheme, firefly algorithm is employed to get optimum solutions for two scaling factors to balance trade-off amid invisibility and robustness. Security in digitized data is an imp
APA, Harvard, Vancouver, ISO, and other styles
27

Agrawal, Sushama Subodh, and Anjali Bhalchandra. "Firefly optimized robust, imperceptible, secure watermarking scheme." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1155–63. https://doi.org/10.11591/ijeecs.v28.i2.pp1155-1163.

Full text
Abstract:
A multi-objective optimized hybrid image watermarking technique is being proposed considering robustness, imperceptibility and security aspects using two different scaling factors. In this technique, original image is subjected to third level lifting wavelet transform (LWT) followed by singular value decomposition (SVD). Watermark is split into two parts to embed each of them into a different subband. In the suggested scheme, firefly algorithm is employed to get optimum solutions for two scaling factors to balance tradeoff amid invisibility and robustness. Security in digitized data is an impo
APA, Harvard, Vancouver, ISO, and other styles
28

Liang, Zhongyue, Qiuxia Qin, Changjun Zhou, Ning Wang, Yi Xu, and Wenshu Zhou. "Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation." PLOS ONE 16, no. 11 (2021): e0260014. http://dx.doi.org/10.1371/journal.pone.0260014.

Full text
Abstract:
Current image encryption methods have many shortcomings for the medical image encryption with high resolution, strong correlation and large storage space, and it is difficult to obtain reliable clinically applicable medical images. Therefore, this paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. And the dynamic analysis of the phase diagram and bifurcation diagram of the five-dimensional three-leaf chaotic system selected in this paper is carried out, and NIST is used to test the randomness of its chaotic seque
APA, Harvard, Vancouver, ISO, and other styles
29

Yang, Zhixuan, and Lin Teng. "A color image encryption algorithm using slide Zigzag scrambling with two-dimensional hyperchaotic system." Physica Scripta 100, no. 6 (2025): 065220. https://doi.org/10.1088/1402-4896/add5a6.

Full text
Abstract:
Abstract Images are crucial information carriers in daily life, but they are vulnerable to various attacks. Therefore, ensuring their security during transmission is of utmost importance. Combining image encryption with chaotic maps can effectively enhance the security of image encryption. Therefore, this paper proposes a novel two-dimensional chaotic system, the 2D Sine-Logistic-Cosine chaotic system, based on the Sine map, Logistic map and Cosine function. The system exhibits a large number of parameters, an extensive parameter range, and excellent chaotic performance. To effectively address
APA, Harvard, Vancouver, ISO, and other styles
30

S, Syed Suhaila, and Pradeep V. "A Novel Fast Color Image Encryption Algorithm based on 2D-Hybrid Maps." Indian Journal of Science and Technology 15, no. 10 (2022): 457–67. https://doi.org/10.17485/IJST/v15i10.2348.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To design a fast and efficient color image encryption technique using 2D Duffing, Henon and Tinkerbell maps.&nbsp;<strong>Methods:</strong>&nbsp;<strong></strong>The presented work employs the confusion-diffusion-confusion structure for encryption. Pixel-level scrambling is undertaken in the first phase of confusion, and the scrambled image is diffused using the Exclusive-OR operation. Finally, bit-level permutation is used for improved security. This work makes use of the 44 samples from the USC-SIPI image database.&nbsp;<strong>Findings:</strong>&nb
APA, Harvard, Vancouver, ISO, and other styles
31

Shaban Hassooni, Ali, and Laith Ali Abdul Rahaim. "FPGA based modified multi-repeat distribution matcher for probabilistic amplitude shaping." Nexo Revista Científica 36, no. 05 (2023): 108–21. http://dx.doi.org/10.5377/nexo.v36i05.17298.

Full text
Abstract:
The technique of probabilistic amplitude modulation, based on distribution matching, has garnered considerable attention in recent years as a means to enhance spectral efficiency and diminish the constellation energy of coded modulation. This paper introduces the implementation of Probabilistic Amplitude Modulation (PAS) using a Modified Multi-Repeat Distribution Matcher (MMRDM) on a Field Programmable Gate Array (FPGA). The Modified Multiple Repetition Distribution Matcher (MMRDM) is integrated into a 2×2 Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) sy
APA, Harvard, Vancouver, ISO, and other styles
32

Torres-Alvarado, Alan, Luis Alberto Morales-Rosales, Ignacio Algredo-Badillo, Francisco López-Huerta, Mariana Lobato-Báez, and Juan Carlos López-Pimentel. "An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy." Sensors 22, no. 8 (2022): 2985. http://dx.doi.org/10.3390/s22082985.

Full text
Abstract:
Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authentication, integrity, and nonrepudiation, which can be achieved using hash functions. A cryptographic hash function that provides a higher level of security is SHA-3. However, in real and modern applications, hardware implementations based on FPGA for hash functions are prone to errors due to noise and rad
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Zefei, Jinqing Li, Xiaoqiang Di, Zhenlong Man, and Yaohui Sheng. "A Novel Multiband Remote-Sensing Image Encryption Algorithm Based on Dual-Channel Key Transmission Model." Security and Communication Networks 2021 (November 18, 2021): 1–27. http://dx.doi.org/10.1155/2021/9698371.

Full text
Abstract:
With the rapid development of remote sensing technology, satellite remote sensing images have been involved in many areas of people’s lives. Remote sensing images contain military secrets, land profiles, and other sensitive data, so it is urgent to encrypt remote sensing images. This paper proposes a dual-channel key transmission model. The plaintext related key is embedded into the ciphertext image through bit-level key hiding transmission strategy, which enhanced the ability of ciphertext image to resist known-plaintext attack and chosen plaintext attack. In addition, a multiband remote sens
APA, Harvard, Vancouver, ISO, and other styles
34

Yao, Yexia, Xuemei Xu, and Zhaohui Jiang. "A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms." Applied Sciences 15, no. 2 (2025): 913. https://doi.org/10.3390/app15020913.

Full text
Abstract:
This paper skillfully incorporates the memristor model into a chaotic system, creating a two-dimensional (2D) hyperchaotic map. The system’s exceptional chaotic performance is verified through methods such as phase diagrams, bifurcation diagrams, and Lyapunov exponential spectrum. Additionally, a universal framework corresponding to the chaotic system is proposed. To enhance encryption security, the pixel values of the image are preprocessed, and a hash function is used to generate a hash value, which is then incorporated into the secret keys generation process. Existing algorithms typically e
APA, Harvard, Vancouver, ISO, and other styles
35

Fang, Jie, Kaihui Zhao, Shixiao Liang, and Jiabin Wang. "Image encryption algorithm based on a novel 2D logistic‐sine‐coupling chaos map and bit‐level dynamic scrambling." Concurrency and Computation: Practice and Experience, August 21, 2024. http://dx.doi.org/10.1002/cpe.8261.

Full text
Abstract:
SummaryThis paper develops a new image encryption algorithm based on a novel two‐dimensional chaotic map and bit‐level dynamic scrambling. First, multiple one‐dimensional chaotic maps are coupled to construct a novel two dimensions Logistic‐Sine‐coupling chaos map (2D‐LSCCM). The performance analysis shows that the 2D‐LSCCM has more complex chaotic characteristics and wider chaotic range than many extant 2D chaos maps. Second, original image matrix combines with hash algorithm SHA‐256 to generate a hash value. The initial values of 2D‐LSCCM are generated based on the hash value. Third, the ori
APA, Harvard, Vancouver, ISO, and other styles
36

Dong, Yumin, Chen Xu, and Chenhao Yin. "Three-layer quantum image encryption algorithm based on 6D hyperchaos." Journal of Applied Physics 134, no. 22 (2023). http://dx.doi.org/10.1063/5.0176657.

Full text
Abstract:
In order to further improve the security and efficiency of quantum image encryption, a three-layer encryption scheme for quantum color images based on 6D hyperchaos is proposed for the improved quantum representation model. The sequences generated by the 6D hyperchaotic system are applied to each layer of image encryption as keys. First, the quantum Fibonacci matrix is used to scramble the pixel value positions of the image to achieve the spatial scrambling of the quantum image; then, the position exchange of red, green, and blue channels and the bit-level cycle shift of pixel value are carrie
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Tongzhe, Zhong Chen, Bofeng Long, et al. "A color image encryption algorithm based on a novel 4D hyperchaotic system and bit-level diffusion." Physica Scripta, September 27, 2024. http://dx.doi.org/10.1088/1402-4896/ad80dd.

Full text
Abstract:
Abstract As digital images are widely used in social media, medical, military and other fields, ensuring the privacy and security of image data has become a critical concern. Firstly, we propose a novel four-dimensional hyperchaotic system and validate that it exhibits a broad chaotic range, as demonstrated by bifurcation diagrams and Lyapunov exponent experiments. Additionally, simulated circuit diagrams verify the hardware feasibility of the proposed system. Secondly, we design a dynamic iterative scrambling (DIS) scheme that dynamically divides the image into multiple matrices for spatially
APA, Harvard, Vancouver, ISO, and other styles
38

Weihao, CHEN, Xuefang Zhou, Ning Zheng, Min-jun Li, and Miao Hu. "Image encryption scheme based on optical chaos and DNA Rubik's Cube algorithm." Physica Scripta, September 28, 2023. http://dx.doi.org/10.1088/1402-4896/acfe48.

Full text
Abstract:
Abstract In order to improve the complexity of optical chaotic sequence output and the encryption efficiency of bit plane encryption, an image encryption algorithm based on optical chaos and DNA Rubik's cube scrambling is proposed. An external disturbance structure of light injection is proposed to improve the complexity of the chaotic sequence of light output from the slave laser by the external disturbance generated by the mutual injection between the driving laser and the main laser. Meanwhile, in the image algorithm, in addition to Rubik's cube scrambling at the pixel level, this paper pro
APA, Harvard, Vancouver, ISO, and other styles
39

"Development of Bit-level Scrambling Encryption Algorithm for Radio Telescope Imageries." Borneo Journal of Sciences & Technology 4, no. 1 (2022). http://dx.doi.org/10.35370/bjost.2022.4.1-08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Huijie, Weizhen Sun, and Ling Lu. "Chaotic encryption algorithm with scrambling diffusion based on the Josephus cycle." Frontiers in Physics 11 (May 9, 2023). http://dx.doi.org/10.3389/fphy.2023.1191793.

Full text
Abstract:
Digital images are characterized by high redundancy and strong interpixel correlation. Breaking the correlation between data and improving sensitivity are crucial to protecting image information. To effectively achieve this goal, a chaotic encryption algorithm based on Josephus cycle scrambling diffusion is proposed in this paper. First, the adaptive key is generated by the Hash function to generate the initial value of the chaotic system, which is highly related to the plaintext image. The generation of the adaptive key can effectively resist plaintext attacks. Second, the pseudorandom sequen
APA, Harvard, Vancouver, ISO, and other styles
41

Gao, Chao, Ri-Gui Zhou, and Xin Li. "A quantum steganography scheme using quantum wavelet transforms." Modern Physics Letters B, June 17, 2022. http://dx.doi.org/10.1142/s0217984921506260.

Full text
Abstract:
Quantum steganography is a technology which can hide information effectively for achieving copyright protection. In this paper, a quantum steganography scheme using quantum wavelet transform and the novel enhanced quantum representation for quantum image is proposed, and this scheme can embed the secret text of size [Formula: see text] into a [Formula: see text] gray-scale carrier image. In the scrambling operation, the text is scrambled by the scrambling circuit including bit-reverse, quantum equal and CNOT gate to improve its security. Before embedding, the carrier image is first transformed
APA, Harvard, Vancouver, ISO, and other styles
42

S., Annadurai, and Geetha P. "Efficient Secured Lossless Coding of Medical Images– Using Modified Runlength Coding for Character Representation." December 28, 2007. https://doi.org/10.5281/zenodo.1073265.

Full text
Abstract:
Lossless compression schemes with secure transmission play a key role in telemedicine applications that helps in accurate diagnosis and research. Traditional cryptographic algorithms for data security are not fast enough to process vast amount of data. Hence a novel Secured lossless compression approach proposed in this paper is based on reversible integer wavelet transform, EZW algorithm, new modified runlength coding for character representation and selective bit scrambling. The use of the lifting scheme allows generating truly lossless integer-to-integer wavelet transforms. Images are compr
APA, Harvard, Vancouver, ISO, and other styles
43

K.U., Shahna, and Anuj Mohamed. "Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion." Signal Processing: Image Communication, September 2021, 116495. http://dx.doi.org/10.1016/j.image.2021.116495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Jinlong, and Heping Wen. "Dynamic feedback bit-level image privacy protection based on chaos and information hiding." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-53325-4.

Full text
Abstract:
AbstractBit is the most basic unit of a digital image in the spatial domain, and bit-level encryption is regarded as an important technical means for digital image privacy protection. To address the vulnerability of image privacy protection to cryptographic attacks, in this paper, a bit-level image privacy protection scheme using Zigzag and chain-diffusion is proposed. The scheme uses a combination of Zigzag interleaving scrambling with chaotic sequences and chain-diffusion method images are encrypted at each bit level, while using non-sequential encryption to achieve efficient and secure encr
APA, Harvard, Vancouver, ISO, and other styles
45

Song, Xiaoming, Daihan Xu, Guodong Li, and Wenxia Xu. "Multi-image Reorganization Encryption Based on S-L-F Cascade Chaos and Bit Scrambling." Journal of Web Engineering, July 8, 2021. http://dx.doi.org/10.13052/jwe1540-9589.20410.

Full text
Abstract:
Aiming at the problems of small value range of a single chaotic parameter, low sequence chaos, and transient effects, a composite chaotic system of cascaded Sine-Sine mapping, Logistic chaos and generalized third-order Fibonacci is proposed (S-L-F). The new system is highly sensitive to initial values, the maximum spectral entropy of the generated sequence can reach 0.95, and the value range of the parameter x is expanded to [0,4] compared with the traditional Logistic, indicating that the new system is suitable for generating pseudo-random sequences for image encryption. For the problem that
APA, Harvard, Vancouver, ISO, and other styles
46

Zhang, Xuncai, Guanhe Liu, and Jiali Di. "An image encryption scheme based on the four-dimensional chaotic system and the Mealy Finite State Machine." Physica Scripta, March 15, 2024. http://dx.doi.org/10.1088/1402-4896/ad3487.

Full text
Abstract:
Abstract This paper proposes a four-dimensional hyperchaotic system to overcome the defect of weak encryption effect due to the simple complexity of low-dimensional chaotic systems in chaos-based image encryption schemes, which is verified to have better chaotic properties by dynamics analysis, sensitivity analysis, and randomness test. In addition, this paper proposes an image encryption scheme by combining the proposed chaotic system with the Mealy finite state machine (MFSM) to overcome the problem that some schemes are not resistant to statistical analysis. Firstly, the chaotic sequence is
APA, Harvard, Vancouver, ISO, and other styles
47

KURT, Erol, and Soner MÜLAYİM. "A New hyper chaotic algorithm for energy video communication security." Journal of Energy Systems, December 31, 2022, 583–93. http://dx.doi.org/10.30521/jes.1160773.

Full text
Abstract:
The usage of the cameras in facilities in the energy sector is becoming more and more common. In addition, with the widespread use of SCADA and the increase in automation of camera-based applications, ensuring security in video data communication has become more and more important. In this study, methods that have been successful in providing image security in previous studies in Ref.[1] have been improved to ensure the security of video data communication. These methods use Kurt-Modified Chua’s Circuit (KMCC) as random number generator. Proposed algorithms are efficient for energy sector secu
APA, Harvard, Vancouver, ISO, and other styles
48

Niu, Ying, Hangyu Zhou, and Xuncai Zhang. "Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-57756-x.

Full text
Abstract:
AbstractTo enhance the security of image data transmission, and address the weaknesses of existing image encryption schemes based on chaotic systems, particularly concerning resistance to differential attacks and the unstable performance of chaotic systems, this article introduces an improved four-dimensional chaotic system and integrates evolutionary operators to propose an image encryption scheme. Firstly, a method for generating pseudo-random sequences associated with the plaintext is designed. The change rate of the ciphertext pixel value exceeds 0.9967 after a slight modification of the p
APA, Harvard, Vancouver, ISO, and other styles
49

Deng, Xuan, Zhong Chen, Bofeng Long, et al. "An image encryption algorithm based on a novel 4D hyperchaotic system and improved Knight’s Tour scrambling algorithm." Physica Scripta, February 21, 2025. https://doi.org/10.1088/1402-4896/adb918.

Full text
Abstract:
Abstract In this paper, we propose an advanced image encryption algorithm that integrates a novel 4D hyperchaotic system and an improved Knight’s Tour algorithm for enhanced security. The 4D hyperchaotic system, characterized by its complex dynamics and multiple positive Lyapunov exponents, generates pseudo-random sequences with high sensitivity to initial conditions. These sequences are utilized in both pixel-level scrambling and bit-level diffusion processes, ensuring robust encryption. The Knight’s Tour, a classical pathfinding algorithm, is enhanced through chaotic sequence-based randomiza
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Xiangzi, Lina Sun, Xicong Geng, et al. "A Novel Image Encryption Scheme Based on CCNN." Physica Scripta, January 10, 2024. http://dx.doi.org/10.1088/1402-4896/ad1d42.

Full text
Abstract:
Abstract With the advancement of computational capacity, the key space will become one of the crucial factors influencing the security of digital cryptographic systems. Despite chaotic-based digital cryptographic systems possessing large key spaces, the post-Moore's era rapid growth in computational capacity continues to pose challenges to the security of chaotic-based cryptographic systems. To address this issue, a novel image encryption scheme based on non-autonomous chaotic system is presented in this paper. In particular, a brain inspired neuron called continuous-coupled neural network (CC
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!