Academic literature on the topic 'Kronecker XOR product'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Kronecker XOR product.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Kronecker XOR product"

1

Yun, Po, Chen Zhang, Yaqi Wu, Xianzi Yang, and Zulfiqar Ali Wagan. "Correction: Yun et al. A Novel Extended Higher-Order Moment Multi-Factor Framework for Forecasting the Carbon Price: Testing on the Multilayer Long Short-Term Memory Network. Sustainability 2020, 12, 1869." Sustainability 16, no. 15 (2024): 6318. http://dx.doi.org/10.3390/su16156318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mfungo, Dani Elias, Xianping Fu, Xingyuan Wang, and Yongjin Xian. "Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map." Applied Sciences 13, no. 6 (2023): 4034. http://dx.doi.org/10.3390/app13064034.

Full text
Abstract:
In today’s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor product, Hill cipher, and sigmoid logistic Map. Our proposed algorithm begins by shifting the values in each row of the state matrix to the left by a predetermined number of positions, then encrypting the resulting image using the Hill Cipher. The top value of each odd or even column is used to perform an xor operation with all values in the corr
APA, Harvard, Vancouver, ISO, and other styles
3

Lestiawan, Heru, Ramadhan Rakhmat Sani, Abdussalam Abdussalam, et al. "Improved imperceptible engagement-based 2D sigmoid logistic maps, Hill cipher, and Kronecker XOR product." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 1866–80. https://doi.org/10.11591/eei.v14i3.8331.

Full text
Abstract:
Image encryption is a crucial facet of secure data transmission and storage, and this study explores the efficacy of combining sigmoid logistic maps (SLM), Hill cipher, and Kronecker's product method in enhancing image encryption processes. The evaluation, conducted on diverse images such as Lena, Rice, Peppers, Cameraman, and Baboon, unveils noteworthy findings. The Lena image emerges as the most successfully encrypted, as evidenced by the lowest mean squared error (MSE) at 92.81 and the highest peak signal-to-noise ratio (PSNR) at 19.43, reflecting superior fidelity and quality preservation.
APA, Harvard, Vancouver, ISO, and other styles
4

Kanwal, Shamsa, Saba Inam, Asghar Ali Shah, et al. "A robust approach to satellite image encryption using chaotic map and circulant matrices." Engineering Reports, September 29, 2024. http://dx.doi.org/10.1002/eng2.13010.

Full text
Abstract:
AbstractIn the modern era, where satellite imagery is vital for applications like ecological monitoring and national security, ensuring the safety and integrity of these data repositories is crucial. This study presents an improved satellite image encryption technique that combines the cryptographic strength of the circulant matrix in the Hill cipher with the dynamic characteristics of the hyperbolic tangent tent map, further enhanced by the Kronecker XOR product. The algorithm initiates with computing alterations by a shift amount. After preserving the leftmost pixel in each row, it executes
APA, Harvard, Vancouver, ISO, and other styles
5

Heru, Lestiawan, Rakhmat Sani Ramadhan, Abdussalam, et al. "Improved imperceptible engagement-based 2D sigmoid logistic maps, Hill cipher, and Kronecker XOR product." May 14, 2025. https://doi.org/10.11591/eei.v14i3.8331.

Full text
Abstract:
Image encryption is a crucial facet of secure data transmission and storage, and this study explores the efficacy of combining sigmoid logistic maps (SLM), Hill cipher, and Kronecker's product method in enhancing image encryption processes. The evaluation, conducted on diverse images such as Lena, Rice, Peppers, Cameraman, and Baboon, unveils noteworthy findings. The Lena image emerges as the most successfully encrypted, as evidenced by the lowest mean squared error (MSE) at 92.81 and the highest peak signal-to-noise ratio (PSNR) at 19.43, reflecting superior fidelity and quality preservation.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Kronecker XOR product"

1

Teşeleanu, George. "Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-89518-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Kronecker XOR product"

1

Teşeleanu, George. "Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012307800003648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!