АЛГОРИТМ КАСКАДНОГО КОДИРОВАНИЯ ИНФОРМАЦИОННОГО ПОТОКА ДЛЯ ЗАЩИЩЕННЫХ СИСТЕМ ПЕРЕДАЧИ ЦИФРОВЫХ ДАННЫХ DOI

V.V. Dubrovskiy,

A.I. Dulkevich

Опубликована: Ноя. 26, 2024

Язык: Русский

An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework DOI Creative Commons
Dhivya Ravichandran,

W. Sylvia Lilly Jebarani,

Hemalatha Mahalingam

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Фев. 3, 2025

Язык: Английский

Процитировано

2

Degn–Harrison map: Dynamical and network behaviours with applications in image encryption DOI

Vismaya VS,

Sishu Shankar Muni,

Anita Kumari Panda

и другие.

Chaos Solitons & Fractals, Год журнала: 2025, Номер 192, С. 115987 - 115987

Опубликована: Янв. 10, 2025

Язык: Английский

Процитировано

1

Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques DOI
Chaofeng Zhao, Zhibo Zhai, Bo Zeng

и другие.

Computer Standards & Interfaces, Год журнала: 2025, Номер 93, С. 103974 - 103974

Опубликована: Янв. 31, 2025

Язык: Английский

Процитировано

1

Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images DOI Creative Commons

Conghuan Ye,

Shenglong Tan, Jun Wang

и другие.

Mathematics, Год журнала: 2025, Номер 13(2), С. 182 - 182

Опубликована: Янв. 8, 2025

The widespread distribution of medical images in smart healthcare systems will cause privacy concerns. unauthorized sharing decrypted remains uncontrollable, though image encryption can discourage disclosure. This research proposes a double-level security scheme for to overcome this problem. proposed joint and watermarking is based on singular-value decomposition (SVD) chaotic maps. First, three different random sequences are used encrypt the LL subband discrete wavelet transform (DWT) domain; then, HL LH sub-bands embedded with watermark information; end, we obtain watermarked encrypted inverse DWT (IDWT) transform. In study, SVD domain. main originality that decryption extraction be performed separately. Experimental results demonstrate superiority method key spaces (10225), PSNR (76.2543), UACI (0.3329). implementation, following achievements attained. our meet requests levels. Second, Third, detected Thus, experiment analysis effectiveness scheme.

Язык: Английский

Процитировано

0

A novel multi-color image compression encryption algorithm based on the reconstruction coefficient matrix and DNA point mutation operation DOI
Meng Tang, Guo Du, Yanping Lin

и другие.

Expert Systems with Applications, Год журнала: 2025, Номер 270, С. 126620 - 126620

Опубликована: Янв. 24, 2025

Язык: Английский

Процитировано

0

Facial image encryption scheme based on improved 4-D hyperchaotic system DOI
Xuncai Zhang,

Min Liu,

Ying Niu

и другие.

The Journal of Supercomputing, Год журнала: 2025, Номер 81(3)

Опубликована: Фев. 1, 2025

Язык: Английский

Процитировано

0

A time-varying image encryption algorithm driven by neural network DOI
Hangming Zhang, Hanping Hu, Weiping Ding

и другие.

Optics & Laser Technology, Год журнала: 2025, Номер 186, С. 112751 - 112751

Опубликована: Март 10, 2025

Язык: Английский

Процитировано

0

A hidden multiwing memristive neural network and its application in remote sensing data security DOI

Sirui Ding,

Hairong Lin, Xiaoheng Deng

и другие.

Expert Systems with Applications, Год журнала: 2025, Номер unknown, С. 127168 - 127168

Опубликована: Март 1, 2025

Язык: Английский

Процитировано

0

Image encryption scheme based on thorp shuffle and pseudo dequeue DOI Creative Commons
Shengtao Geng,

Dongguang Guo,

Xuncai Zhang

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Апрель 1, 2025

To enhance the security level of image data transmission, this paper proposes a four-dimensional hyperchaotic encryption scheme based on combination Thorp shuffle and pseudo dequeue. First, nonlinear term classic Chen chaotic system is improved to construct an system. Phase diagrams, Lyapunov exponents, equilibrium points are used analyze its dynamic characteristics. The has rich behaviors, maximum exponent reaches 11.3. Second, SHA-256 algorithm in with plain information generate initial key. On basis key, pseudorandom sequence generated by for scrambling diffusion operations. An combined sequences subsequently designed, which includes index scrambling, double-ended shuffle, step multiplane bit operation. Finally, performance evaluated through experiments such as statistical analysis, differential attack noise analysis. entropy cipher can reach 7.9994, number pixel change rates unified average intensity being close ideal value, percentage floating frequency 63%. results show that proposed high efficiency performs excellently terms anti-attack performance.

Язык: Английский

Процитировано

0

Enhanced secure color image encryption using a novel hyperchaotic 2D-ETCS model and cross-permutation DOI
Zhen Li,

Shuang Zhang,

Weijie Tan

и другие.

Nonlinear Dynamics, Год журнала: 2025, Номер unknown

Опубликована: Апрель 5, 2025

Язык: Английский

Процитировано

0