An improved chaotic image encryption algorithm
Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. In past works, chaos-based cryptosystems applied the chaotic dynamical system with the linkage to the harmonization of two cha...
| Main Authors: | Al-Khasawneh, Mahmoud Ahmad, Shamsuddin, Siti Mariyam, M.Kamrul Hasan, Shafaatunnur, Ibrahim, Adamu Abubakar |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/70815/ http://irep.iium.edu.my/70815/1/70815_An%20improved%20chaotic%20image_SCOPUS.pdf http://irep.iium.edu.my/70815/7/70815_An%20improved%20chaotic%20image%20encryption%20algorithm.pdf |
Similar Items
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
MapReduce a comprehensive review
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)
by: Charomie, Tat Wi
Published: (2010)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapi’ee
Published: (2012)
by: Jamel, Sapi’ee
Published: (2012)
A reliable numeric analytic technique for improving the solution of nonlinear chaotic and hyperchaotic problems
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2015)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2015)
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
by: Nurnajmin Qasrina Ann, Ayop Azmi
Published: (2023)
by: Nurnajmin Qasrina Ann, Ayop Azmi
Published: (2023)
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
by: Nurnajmin Qasrina Ann, ., et al.
Published: (2022)
by: Nurnajmin Qasrina Ann, ., et al.
Published: (2022)
Detecting the phenomenon of strange non-chaotic attractors
by: Oxley, A.
Published: (2010)
by: Oxley, A.
Published: (2010)
OctaSOM - An octagonal based SOM lattice structure for biomedical problems
by: Hasan, Shafaatunnur, et al.
Published: (2015)
by: Hasan, Shafaatunnur, et al.
Published: (2015)
Data encryption in e-counselling system (DEECS)
by: Athirah Fayyadhah, Othman
Published: (2009)
by: Athirah Fayyadhah, Othman
Published: (2009)
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018)
by: Mohammed Ismael, Saba
Published: (2018)
The multistage homotopy perturbation method for solving chaotic and hyperchaotic Lü system
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2015)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2015)
A new application of multistage homotopy perturbation method to the chaotic Rössler system
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
Secure text transfer via bluetooth using hybrid encryption
by: Fakhrul Hakimi, Saidi
Published: (2012)
by: Fakhrul Hakimi, Saidi
Published: (2012)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
Artificial neural network learning enhancement using Artificial Fish Swarm Algorithm
by: Hasan, Shafaatunnur, et al.
Published: (2011)
by: Hasan, Shafaatunnur, et al.
Published: (2011)
Artificial fish swarm optimization for multilayer network learning in classification problems
by: Hasan, Shafaatunnur, et al.
Published: (2012)
by: Hasan, Shafaatunnur, et al.
Published: (2012)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
An intelligent optimization strategy for medical doctor rostering using hybrid genetic algorithm-particle swarm optimization in Malaysian public hospital
by: Zanariah, Zainudin, et al.
Published: (2025)
by: Zanariah, Zainudin, et al.
Published: (2025)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Mathematical analysis of chaotic behavior in monetary policy rules
by: Mohseni, Reza Moosavi
Published: (2013)
by: Mohseni, Reza Moosavi
Published: (2013)
Image compression and encryption
by: Zainal Abidin, Zuhairiah
Published: (2003)
by: Zainal Abidin, Zuhairiah
Published: (2003)
Image watermarking optimization algorithms in transform domains and feature regions
by: Tao, Hai
Published: (2012)
by: Tao, Hai
Published: (2012)
Perbandingan penggunaan algoritma Krzyzak dengan algoritma rambatan balik piawai dalam domain peramalan
by: Alwee, Razana, et al.
Published: (2004)
by: Alwee, Razana, et al.
Published: (2004)
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014)
by: Moh, Heng Huong
Published: (2014)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Rift: a high-performance consensus algorithm for Consortium Blockchain
by: Khan, Fazeel Ahmed, et al.
Published: (2019)
by: Khan, Fazeel Ahmed, et al.
Published: (2019)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Similar Items
-
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003) -
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003) -
MapReduce a comprehensive review
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018) -
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010) -
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)