Image encryption algorithm based on chaotic mapping
Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting the confidentiality, inte...
| Main Authors: | Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2003
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/2075/ http://eprints.utm.my/2075/1/JTMKK39%28D%29bab1.pdf |
Similar Items
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018)
by: Mohammed Ismael, Saba
Published: (2018)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Pseudo Random Bits' Generator Based on Tent Chaotic Map and Linear Feedback Shift Register
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
A Chaotic Teaching Learning Based Optimization Algorithm for Optimization Emergency Flood Evacuation Routing
by: Kamal Z., Zamli
Published: (2016)
by: Kamal Z., Zamli
Published: (2016)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Chaotic-based encryption algorithm using henon
and logistic maps for fingerprint template
protection
by: Siswanto, Apri, et al.
Published: (2020)
by: Siswanto, Apri, et al.
Published: (2020)
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012)
by: Norhidayah, Muhammad, et al.
Published: (2012)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Assessing the chaotic map population initializations for sine cosine algorithm using the case study of pairwise test suite generation
by: Din, Fakhrud, et al.
Published: (2022)
by: Din, Fakhrud, et al.
Published: (2022)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah
Published: (2006)
by: Ibrahim, Subariah
Published: (2006)
Designing and implementation of robot mapping algorithm for mobile robot
by: Ismail , Amelia Ritahani, et al.
Published: (2014)
by: Ismail , Amelia Ritahani, et al.
Published: (2014)
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
by: Ismail , Amelia Ritahani, et al.
Published: (2014)
by: Ismail , Amelia Ritahani, et al.
Published: (2014)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
MapReduce algorithm for weather dataset
by: Majid, Mazlina A., et al.
Published: (2018)
by: Majid, Mazlina A., et al.
Published: (2018)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
by: Elfadil, Sabeil Mohamed Ali
Published: (2009)
by: Elfadil, Sabeil Mohamed Ali
Published: (2009)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
A Wavelet-Based Particle Swarm Optimization Algorithm for Digital Image Watermarking
by: Jasni, Mohamad Zain, et al.
Published: (2012)
by: Jasni, Mohamad Zain, et al.
Published: (2012)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Similar Items
-
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003) -
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018) -
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015) -
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)