To see the other types of publications on this topic, follow the link: Iterative encryption.

Journal articles on the topic 'Iterative encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Iterative encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Y. Wanbo, Z. Qinwu, and Z. Qingjian3. "chaotic image encryption method based on three-dimensional nonlinear system." Mustansiriyah Journal of Pure and Applied Sciences 1, no. 3 (2023): 1–27. http://dx.doi.org/10.47831/mjpas.v1i3.43.

Full text
Abstract:
Due to the simple structure of one-dimensional chaotic mapping, there may be problems such as lack of security in applying to image encryption; so many researchers have proposed some high-dimensional chaotic mapping to apply to image encryption. However, high-dimensional chaotic mapping may be difficult to be applied in practice because of its complex structure and high cost. So this paper proposes an image encryption method with a relatively simple structure, low cost, and good encryption effect. The Proposed method combines a chaotic system with 3D nonlinear function iterative systems to enc
APA, Harvard, Vancouver, ISO, and other styles
2

Kaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.

Full text
Abstract:
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and considerable research effort is required. This paper includes the complete step by step implementation of advance encryption technique, i.e. encrypting and decrypting 128 bit data using the AES and its modification for enhanced reliability and security. The encryption process consists of the combination of various classical techniques such as substitution, rearrangement and transformation encoding technique. The encryption and decryption module include
APA, Harvard, Vancouver, ISO, and other styles
3

Liu Fu-Min, Zhai Hong-Chen, and Yang Xiao-Ping. "Kinoform-based iterative random phase encryption." Acta Physica Sinica 52, no. 10 (2003): 2462. http://dx.doi.org/10.7498/aps.52.2462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.

Full text
Abstract:
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is
APA, Harvard, Vancouver, ISO, and other styles
5

Stănică, George Cosmin, and Petre Anghelescu. "Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata." Mathematics 13, no. 2 (2025): 304. https://doi.org/10.3390/math13020304.

Full text
Abstract:
The increasing demand for secure and efficient encryption algorithms has intensified the exploration of alternative cryptographic solutions, including biologically inspired systems like cellular automata. This study presents a symmetric block encryption design based on multiple reversible cellular automata (RCAs) that can assure both computational efficiency and reliable restoration of original data. The encryption key, with a length of 224 bits, is composed of specific rules used by the four distinct RCAs: three with radius-2 neighborhoods and one with a radius-3 neighborhood. By dividing pla
APA, Harvard, Vancouver, ISO, and other styles
6

Vilardy O., Juan M., Leiner Barba J., and Cesar O. Torres M. "Image Encryption and Decryption Systems Using the Jigsaw Transform and the Iterative Finite Field Cosine Transform." Photonics 6, no. 4 (2019): 121. http://dx.doi.org/10.3390/photonics6040121.

Full text
Abstract:
We propose the use of the Jigsaw transform (JT) and the iterative cosine transform over a finite field in order to encrypt and decrypt images. The JT is a nonlinear operation that allows one to increase the security over the encrypted images by adding new keys to the encryption and decryption systems. The finite field is a finite set of integer numbers where the basic mathematical operations are performed using modular arithmetic. The finite field used in the encryption and decryption systems has an order given by the Fermat prime number 257. The iterative finite field cosine transform (FFCT)
APA, Harvard, Vancouver, ISO, and other styles
7

Stoyanov, Borislav, and Gyurhan Nedzhibov. "Symmetric Key Encryption Based on Rotation-Translation Equation." Symmetry 12, no. 1 (2020): 73. http://dx.doi.org/10.3390/sym12010073.

Full text
Abstract:
In this paper, an improved encryption algorithm based on numerical methods and rotation–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption and decryption. Most symmetric key encryption algorithms use either block ciphers or stream ciphers. Our goal in this work is to improve an existing encryption algorithm by using a faster convergent iterative method, providing secure convergence of the corresponding numerical scheme, and improved securi
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Huijuan, and Yurong Wang. "Double-image encryption based on iterative gyrator transform." Optics Communications 281, no. 23 (2008): 5745–49. http://dx.doi.org/10.1016/j.optcom.2008.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yan, Cheng-Han Zheng, and Naohiro Tanno. "Optical encryption based on iterative fractional Fourier transform." Optics Communications 202, no. 4-6 (2002): 277–85. http://dx.doi.org/10.1016/s0030-4018(02)01113-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Zhengjun, and Shutian Liu. "Double image encryption based on iterative fractional Fourier transform." Optics Communications 275, no. 2 (2007): 324–29. http://dx.doi.org/10.1016/j.optcom.2007.03.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

François, Michael, Thomas Grosges, Dominique Barchiesi, and Robert Erra. "Image Encryption Algorithm Based on a Chaotic Iterative Process." Applied Mathematics 03, no. 12 (2012): 1910–20. http://dx.doi.org/10.4236/am.2012.312262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

WANG, XING-YUAN, and XIAO-JUAN WANG. "A NEW CHAOTIC ENCRYPTION ALGORITHM BASED ON THE ERGODICITY OF CHAOS." International Journal of Modern Physics B 25, no. 15 (2011): 2047–53. http://dx.doi.org/10.1142/s0217979211100825.

Full text
Abstract:
This paper proposes a new symmetric key encryption algorithm based on one-dimensional chaotic map. This algorithm uses the random-like property and ergodicity of chaotic systems. In the process of encryption or decryption, this algorithm generates a chaotic pseudo-random sequence, changes the initial iterative times and the increment to encrypt the plaintext, and realizes fast encryption and decryption of all kinds of files. When analyzing the algorithm's performance and security, the result shows that, compared with the method of Baptista, the proposed method is safer, faster and more powerfu
APA, Harvard, Vancouver, ISO, and other styles
13

Vashisth, Sunanda, Hukum Singh, A. K. Yadav, and Kehar Singh. "Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform." International Journal of Optics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/728056.

Full text
Abstract:
A frequency plane phase mask based on Devil’s vortex structure has been used for image encryption using the fractional Mellin transform. The phase key for decryption is obtained by an iterative phase retrieval algorithm. The proposed scheme has been validated for grayscale secret target images, by numerical simulation. The efficacy of the scheme has been evaluated by computing mean-squared-error between the secret target image and the decrypted image. Sensitivity analysis of the decryption process to variations in various encryption parameters has been carried out. The proposed encryption sche
APA, Harvard, Vancouver, ISO, and other styles
14

Patil, S. Ankitha. "A Novel Chaotic Image Encryption Algorithm based on Coordinate Descent and SHA-256." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1451–56. https://doi.org/10.22214/ijraset.2025.67447.

Full text
Abstract:
Since each encryption necessitates the transmission of the key, chaotic image encryption methods with key and plaintext association have emerged in recent years. These algorithms are essentially one-time pad at a time. Nevertheless, some current systems are unable to map the seed key to the chaotic system's initial value in a unique way, which reduces the encryption system's key space. Furthermore, some techniques defy the one-time pad strategy by encrypting the same image with the same key. These issues are resolved in this paper in two ways. On the one hand, SHA-256 is used to calculate a ha
APA, Harvard, Vancouver, ISO, and other styles
15

Deng, Miaolei. "Hybrid Encryption Algorithm for Sensitive Information of College Physical Fitness in Cloud Storage Environment." Journal of Sensors 2022 (September 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/1552437.

Full text
Abstract:
In order to improve the security of college sports fitness sensitive information, this paper proposes a hybrid encryption algorithm for college sports fitness sensitive information in cloud storage environment. Build an analysis model of influencing factors of cloud storage environment to identify the risk value of sensitive information; Using Bloom filter data structure to eliminate redundant data of sensitive information; The transmission channel model of sensitive information and the security coding model of sensitive information are constructed. Combined with the fuzzy differential informa
APA, Harvard, Vancouver, ISO, and other styles
16

Ye, Qing, Qiaojia Zhang, Sijie Liu, and Kaiqiang Chen. "A novel chaotic system based on coupled map lattice and its application in HEVC encryption." Mathematical Biosciences and Engineering 18, no. 6 (2021): 9410–29. http://dx.doi.org/10.3934/mbe.2021463.

Full text
Abstract:
<abstract> <p>Video information is currently widely used in various fields. Compared with image and text data, video data has the characteristics of large data volume, strong data relevance, and large data redundancy, which makes traditional cryptographic systems no longer suitable for video encryption systems. The paper proposes a new chaotic system based on coupled map lattice (CML) and applies it to high efficiency video coding (HEVC) video encryption. The chaotic system logistic-iterative chaotic map with infinite collapses-coupled map lattice (L-ICMIC-CML), which is improved o
APA, Harvard, Vancouver, ISO, and other styles
17

Seo, Dong-Hoan, Sung-Geun Lee, and Yoon-Sik Kim. "Practical Encryption and Decryption System using Iterative Phase Wrapping Method." Journal of the Korean Society of Marine Engineering 32, no. 6 (2008): 955–63. http://dx.doi.org/10.5916/jkosme.2008.32.6.955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Qian, Sheng-Xia, Yongnan Li, Ling-Jun Kong, et al. "Security enhancement of double-random phase encryption by iterative algorithm." Journal of Optics 16, no. 8 (2014): 085401. http://dx.doi.org/10.1088/2040-8978/16/8/085401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Guo, Changliang, Shi Liu, and John T. Sheridan. "Iterative phase retrieval algorithms Part II: Attacking optical encryption systems." Applied Optics 54, no. 15 (2015): 4709. http://dx.doi.org/10.1364/ao.54.004709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Guo, Cheng, Ce Wei, Jiubin Tan, et al. "A review of iterative phase retrieval for measurement and encryption." Optics and Lasers in Engineering 89 (February 2017): 2–12. http://dx.doi.org/10.1016/j.optlaseng.2016.03.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

WANG, XING-YUAN, and TIAN WANG. "A NOVEL ALGORITHM FOR IMAGE ENCRYPTION BASED ON COUPLE CHAOTIC SYSTEMS." International Journal of Modern Physics B 26, no. 30 (2012): 1250175. http://dx.doi.org/10.1142/s0217979212501755.

Full text
Abstract:
In this paper, an image encryption algorithm based on couple multiple chaotic systems is presented. It made the one-dimensional Coupled Map Lattice (CML) formed by Skew Tent map as spatiotemporal chaotic system and made its output sequence as the initial value of logistic and meanwhile did iterative of specific times to get the final key sequence, and then did XOR operations with corresponding pixels to finish the encryption. Numerical analysis expresses that this algorithm has large enough space and high security.
APA, Harvard, Vancouver, ISO, and other styles
22

Abbas, Zamil Hussain, and Abid Ali Khodher Maisa'a. "Medical image encryption using multi chaotic maps." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 21, no. 3 (2023): 556–65. https://doi.org/10.12928/telkomnika.v21i3.24324.

Full text
Abstract:
Over the last twenty years, chaos-based encryption has been an increasingly popular way to encrypt and decrypt data using nonlinear dynamics and deterministic chaos. Discrete chaotic systems based on iterative maps have gotten a lot of interest because of their simplicity and speed. In this paper, three kinds of chaotic maps are utilized to build a digital image encryption strategy depending on a chaotic system. These chaotic maps are the logistic map, Arnold Cat’s map, and Baker’s map. In addition to using the triple data encryption standard (3DES) encryption scheme with the chaot
APA, Harvard, Vancouver, ISO, and other styles
23

Feng, Luoyin, Jize Du, and Chong Fu. "Double graph correlation encryption based on hyperchaos." PLOS ONE 18, no. 9 (2023): e0291759. http://dx.doi.org/10.1371/journal.pone.0291759.

Full text
Abstract:
Preventing unauthorized access to sensitive data has always been one of the main concerns in the field of information security. Accordingly, various solutions have been proposed to meet this requirement, among which encryption can be considered as one of the first and most effective solutions. The continuous increase in the computational power of computers and the rapid development of artificial intelligence techniques have made many previous encryption solutions not secure enough to protect data. Therefore, there is always a need to provide new and more efficient strategies for encrypting inf
APA, Harvard, Vancouver, ISO, and other styles
24

Vidyashree H R. "Symmetric Key Encryption Using Modular Traversal of Ananta-Graphs." Journal of Information Systems Engineering and Management 10, no. 44s (2025): 823–31. https://doi.org/10.52783/jisem.v10i44s.8673.

Full text
Abstract:
In this paper, we propose a novel symmetric key encryption scheme inspired by modular traversal of Ananta-Graphs. The system utilizes an iterative traversal mechanism over modular arithmetic to generate a shared secret key between communicating parties without directly exchanging private information. By leveraging the predictable yet secure path generation properties of the modular traversal, the shared key is derived independently by both participants, ensuring confidentiality and integrity. The encryption and decryption processes employ lightweight operations mapped into readable alphabetic
APA, Harvard, Vancouver, ISO, and other styles
25

Chandra, Marutesh, and Pankaj Sharma. "Image Encryption based on Random Scrambling and Chaotic Gauss Iterative Map." International Journal of Computer Applications 157, no. 3 (2017): 18–23. http://dx.doi.org/10.5120/ijca2017912647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Romanko, D. A., and V. M. Fomichev. "On mathematical models of key mixing for iterative block encryption algorithms." Prikladnaya diskretnaya matematika. Prilozhenie, no. 10 (September 1, 2017): 93–96. http://dx.doi.org/10.17223/2226308x/10/38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Alattar, Munqath H., Ali Al Farawn, and Nabeel Salih Ali. "Anti-continuous collisions user-based unpredictable iterative password salted hash encryption." International Journal of Internet Technology and Secured Transactions 8, no. 4 (2018): 619. http://dx.doi.org/10.1504/ijitst.2018.095944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Al Farawn, Ali, Nabeel Salih Ali, and Munqath Alattar. "Anti-Continuous Collisions User Based Unpredictable Iterative Password Salted Hash Encryption." International Journal of Internet Technology and Secured Transactions 1, no. 1 (2019): 1. http://dx.doi.org/10.1504/ijitst.2019.10011565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Korchynskyi, Volodymyr, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, and Khaled Alfaiomi. "Method of information protection based on the integration of probabilistic encryption and noise immune coding." Radioelectronic and Computer Systems, no. 4 (December 6, 2023): 184–95. http://dx.doi.org/10.32620/reks.2023.4.13.

Full text
Abstract:
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data. The goal is to develop a multi-stage method for protecting information from unauthorized access, based on probabilistic encryption integration, error-correcting code, and error decorrelation. The tasks to be solved are as follows: to develop a probabilistic encryption algorithm that considers the entropy of the characters’ appearance in a message; to implement iterative coding with variable paramete
APA, Harvard, Vancouver, ISO, and other styles
30

Stănică, George Cosmin, and Petre Anghelescu. "Multi-Layer Cryptosystem Using Reversible Cellular Automata." Electronics 14, no. 13 (2025): 2627. https://doi.org/10.3390/electronics14132627.

Full text
Abstract:
The growing need for adaptable and efficient hardware-based encryption methods has led to increased interest in unconventional models such as cellular automata (CA). This study presents the hardware design and the field programmable gate array (FPGA)-based implementation of a multi-layer symmetric block encryption algorithm built on the principles of reversible cellular automata (RCA). The algorithm operates on 128-bit plaintext blocks processed over iterative rounds and integrates five RCA components, each assigned with specific transformation roles to ensure high data diffusion. A 256-bit se
APA, Harvard, Vancouver, ISO, and other styles
31

Sharma, Bhavana, Hukum Singh, Pankaj Rakheja1, and Mehak Khurana. "Non-linear cryptosystem utilizing biological mutation operation in the two-dimensional non-separable linear canonical transform domain." Optica Applicata 54, no. 4 (2025): 581–607. https://doi.org/10.37190/oa/194974.

Full text
Abstract:
This paper introduces a novel image encryption algorithm in the 2D-NSCT domain, employing a 4D hyperchaotic mapping, DNA coding with biological mutation, and the phase truncation and Fourier transfrom (PTFT) operation. Unlike existing DNA-based encryption methods that heavily rely on the XOR operator, our proposed scheme integrates a biological mutation operator to enhance the security of the encryption process. The performance and effectiveness of our cryptosystem are thoroughly evaluated through comprehensive experiments and analysis on various grayscale images, including <i>Cameraman&
APA, Harvard, Vancouver, ISO, and other styles
32

DZHULIY, V., I. MULYAR, V. ORLENKO, V. TITOVA, and V. ANIKIN. "SYMMETRIC CRYPTOSYSTEM WITH NONLINEAR ENCRYPTION AND THE POSSIBILITY OF CONTROL OF CIPHERTEXT FOR CONCEALMENT." Herald of Khmelnytskyi National University. Technical sciences 291, no. 6 (2020): 33–38. https://doi.org/10.31891/2307-5732-2020-291-6-33-38.

Full text
Abstract:
The article proposes a simple symmetric permutation cryptosystem, in which permutations occur based on streaming generation of random numbers. Substitution-permutation algorithms are quite common today. They have proven to be reliable crypto-strong ciphers that have seriously competed with iterative mathematical ciphers, based on the Feistel network, and are gradually displacing them more and more, taking their place. The aim of the article is to propose an encryption algorithm that has a simple structure and is easy to implement. At the same time, it is estimated to be quite resistant to cryp
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Shu Cong, Yan Xing Song, and Rui Hong Yu. "The Application of Oversampled Chebyshev Chaotic Sequences in Voice Communication Encryption." Advanced Materials Research 655-657 (January 2013): 1745–49. http://dx.doi.org/10.4028/www.scientific.net/amr.655-657.1745.

Full text
Abstract:
On the basis of studying characteristics of chaotic sequences, the paper improved iterative process of the chaos, processed the chaotic chebyshev sequences by over-sampling and applied in speech signals transmission system, achieved encryption and decryption of chaotic sequences of voice signals. The results showed that the application of over-sampling technique in chaotic spread spectrum communication could greatly enhance the confidentiality of wireless communications.
APA, Harvard, Vancouver, ISO, and other styles
34

Sharma, Vijay K., Saurabh Kumar, and K. K. Mahapatra. "Iterative and Fully Pipelined High Throughput Efficient Architectures of AES in FPGA and ASIC." Journal of Circuits, Systems and Computers 25, no. 05 (2016): 1650049. http://dx.doi.org/10.1142/s0218126616500493.

Full text
Abstract:
This paper presents high throughput iterative and pipelined VLSI architectures of the Advanced encryption standard (AES) algorithm based on composite field arithmetic in polynomial basis. A logical rearrangement has been performed in the byte substitution (S-box) module to reduce the number of gates in the critical path. Also, inversion in GF(24) module has been separately optimized. ASIC implementation of our S-box has comparatively low power and low energy consumption. The iterative and pipelined implementations of AES in field programmable gate array (FPGA) and ASIC using proposed S-box hav
APA, Harvard, Vancouver, ISO, and other styles
35

P.Ghodake, Asha, and Sujata Mendgudle. "Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction." International Journal of Computer Applications 62, no. 1 (2013): 16–20. http://dx.doi.org/10.5120/10044-4628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lu, Zhe, Wenjin Lv, Yupeng Zhu, et al. "Optical information encryption based on partially-update iterative system with azimuth multiplexing." Optics Communications 510 (May 2022): 127899. http://dx.doi.org/10.1016/j.optcom.2022.127899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Zhengjun, Qing Guo, Lie Xu, Muhammad Ashfaq Ahmad, and Shutian Liu. "Double image encryption by using iterative random binary encoding in gyrator domains." Optics Express 18, no. 11 (2010): 12033. http://dx.doi.org/10.1364/oe.18.012033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Huijuan, and Yurong Wang. "Double-image encryption by iterative phase retrieval algorithm in fractional Fourier domain." Journal of Modern Optics 55, no. 21 (2008): 3601–9. http://dx.doi.org/10.1080/09500340802361333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Han, Jian Wang, Ya-Cong Geng, Yan Song, and Ji-Qiang Liu. "Quantum Image Encryption Based on Iterative Framework of Frequency-Spatial Domain Transforms." International Journal of Theoretical Physics 56, no. 10 (2017): 3029–49. http://dx.doi.org/10.1007/s10773-017-3469-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Trang, Hoang, and Nguyen Van Loi. "Low-Latency, Small-Area FPGA Implementation of the Advanced Encryption Standard Algorithm." International Journal of Distributed Systems and Technologies 4, no. 1 (2013): 56–77. http://dx.doi.org/10.4018/jdst.2013010105.

Full text
Abstract:
This paper presents a Field-Programmable Gate Array (FPGA) implementation of an Advanced Encryption Standard (AES) algorithm using approach of combination iterative looping and Look-Up Table (LUT)-based S-box with block and key size of 128 bits. Modifications in the way of loading data out in AES encryption/decryption, loading key_expansion in Key_Expansion blocks are also proposed. The design is tested with the sample vectors provided by Federal Information Processing Standard (FIPS) 197. The design is implemented on APEX20KC Altera’s FPGA and on Virtex XCV600 Xilinx’s FPGA. For all the autho
APA, Harvard, Vancouver, ISO, and other styles
41

Liu, Wenhao, Kehui Sun, Yi He, and Mengyao Yu. "Color Image Encryption Using Three-Dimensional Sine ICMIC Modulation Map and DNA Sequence Operations." International Journal of Bifurcation and Chaos 27, no. 11 (2017): 1750171. http://dx.doi.org/10.1142/s0218127417501711.

Full text
Abstract:
Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a three-dimensional hyperchaotic Sine ICMIC modulation map (3D-SIMM) is proposed based on a close-loop modulation coupling (CMC) method. Based on this map, a novel color image encryption algorithm is designed by employing a hybrid model of multidirectional circular permutation and deoxyribonucleic acid (DNA) masking. In this scheme, the pixel positions of image are scrambled by multidirectional circular permutation, and the pixel values are substituted by DNA sequence operations. The simulation results and security
APA, Harvard, Vancouver, ISO, and other styles
42

Yang, Feifei, Xinlei An, and Li xiong. "A new discrete chaotic map application in image encryption algorithm." Physica Scripta 97, no. 3 (2022): 035202. http://dx.doi.org/10.1088/1402-4896/ac4fd0.

Full text
Abstract:
Abstract In this work, a new discrete chaotic map is developed from the 1D ICMIC (Iterative Map with Infinite Collapses) to control the 2D Hénon map. The performances of the proposed discrete map are evaluated by using the phase diagram, Lyapunov exponent spectrum and complexity. It is found that the new chaotic map has larger value of complexity, and chaotic states are distributed in large parameter ranges. Thus the new chaotic map has better chaotic features and randomness, it is especially suitable for the chaotic secure communication. Then an image encryption algorithm is proposed based on
APA, Harvard, Vancouver, ISO, and other styles
43

Shravani Amar. "Shielded conveyance of Gut Medical Data in IoMT Networks Using Dual Mode Cryptography and Image Steganography Techniques." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 806–21. https://doi.org/10.52783/jisem.v10i16s.2667.

Full text
Abstract:
Gut diseases impact millions of individuals worldwide, underscoring the urgent need for effective security measures in healthcare systems to protect vulnerable medical information. With the increasing adoption of Internet of Medical Things (IoMT) devices for monitoring and managing GI conditions, ensuring the confidentiality and integrity of patient data is paramount. Current security protocols often struggle with issues such as high computational demands and susceptibility to advanced cyber-attacks, highlighting the need for more robust and efficient solutions. To address these challenges, Tw
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Hong Ye, Guang Hui Cai, Hong Chao Sun, and Xiao Cong Ma. "Design and Implementation of AES Key Generator Based on FPGA." Advanced Materials Research 1022 (August 2014): 104–7. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.104.

Full text
Abstract:
With the continuous development of computer networks, security of data is particularly important. AES algorithm is the new data encryption standard after DES algorithm, which has a higher security and faster running speed. Since the promulgation, it has been widely analyzed and multi used around the world. AES algorithm is iterative algorithm,which needs a key generator to generate the encryption and decryption keys for each round.The key generator mainly designs two modules including S box replacement (SubWord) module and Cycle left shift (RotWord) module. After processing results and Rcon ar
APA, Harvard, Vancouver, ISO, and other styles
45

Ravikiran, Dr P., M. Gnaneshwar, Enje Hepsibha, and Sudhesh Srivastav. "FPGA Implementation of 256-Bit Key AES Algorithm." International Journal for Research in Applied Science and Engineering Technology, no. 6 (June 30, 2024): 282–91. http://dx.doi.org/10.22214/ijraset.2024.63028.

Full text
Abstract:
Abstract: The most popular network security technique for secure data transmission between two end users, particularly over a public network, is the AES algorithm, also known as the Rijndael algorithm. It may be found in all kinds of wired and wireless digital communication networks AES, a network security technique, uses 256 bits on an FPGA. An authorized cryptographic technique that can be used to secure electronic data is the Advanced Encryption Standard technique (AES), which is specified by the National Institute of Standards and Technology. Because they provide faster and more flexible s
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Juan. "A Symmetric Cryptography Algorithm in Wireless Sensor Network Security." International Journal of Online Engineering (iJOE) 13, no. 11 (2017): 102. http://dx.doi.org/10.3991/ijoe.v13i11.7752.

Full text
Abstract:
<span style="color: black; font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: 宋体; mso-themecolor: text1; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to study the symmetric cryptography algorithm, which plays an essential role in ensuring the information security, AES (Advanced Encryption Standard) basic theory is discussed, and AES protocol processor for a small area based on wireless sensor network is designed. In addition, an iterative encryption and decryption AES structure is designed to achieve
APA, Harvard, Vancouver, ISO, and other styles
47

Liansheng, Sui, Cheng Yin, Li Bing, Tian Ailing, and Anand Krishna Asundi. "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval." Laser Physics Letters 15, no. 7 (2018): 075204. http://dx.doi.org/10.1088/1612-202x/aac002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Shao, Zhuhong, Huazhong Shu, Jiasong Wu, Zhifang Dong, Gouenou Coatrieux, and Jean Louis Coatrieux. "Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain." Optics Express 22, no. 5 (2014): 4932. http://dx.doi.org/10.1364/oe.22.004932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sui, Liansheng, and Bo Gao. "Single-channel color image encryption based on iterative fractional Fourier transform and chaos." Optics & Laser Technology 48 (June 2013): 117–27. http://dx.doi.org/10.1016/j.optlastec.2012.10.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Zhengjun, Lie Xu, Chuang Lin, Jingmin Dai, and Shutian Liu. "Image encryption scheme by using iterative random phase encoding in gyrator transform domains." Optics and Lasers in Engineering 49, no. 4 (2011): 542–46. http://dx.doi.org/10.1016/j.optlaseng.2010.12.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!