Indonesian Journal of Electrical Engineering and Computer Science,
Год журнала:
2022,
Номер
27(3), С. 1698 - 1698
Опубликована: Авг. 10, 2022
Network
<span>security
continues
to
be
the
priority
of
many
organizations.
To
ensure
protection
their
data,
they
pay
great
attention
Encryption
systems.
Moreover,
because
enormous
developments
in
networks
connection
particularly
internet
which
has
used
by
several
people
share
a
variety
data
kinds.
The
security
been
significant
issue.
As
result,
there
is
focus
using
methods
decryption
and
encryption.
Numerous
encryption
techniques
have
become
advanced
preserve
protection,
chaotic
systems
are
one
these
widely
recent
years,
where
were
proposed
use
map
for
encrypt
images
reason
that
characteristics
e.g.,
random
action
unpredictability
initial
conditions
sensitivity.
In
this
paper,
proof
authentication
sent
information
algorithm
provide
cipher
text
hidden
image
then
send
another
user.
This
approach
applied
cellular
operating
system
environment
(android).
Thus,
sending
receiving
will
safe
secure.
tested
on
different
types
mobile.
gives
good
results.</span>
Future Internet,
Год журнала:
2023,
Номер
15(3), С. 94 - 94
Опубликована: Фев. 27, 2023
In
recent
years,
the
interdisciplinary
field
of
quantum
computing
has
rapidly
developed
and
garnered
substantial
interest
from
both
academia
industry
due
to
its
ability
process
information
in
fundamentally
different
ways,
leading
hitherto
unattainable
computational
capabilities.
However,
despite
potential,
full
extent
computing’s
impact
on
healthcare
remains
largely
unexplored.
This
survey
paper
presents
first
systematic
analysis
various
capabilities
enhancing
systems,
with
a
focus
potential
revolutionize
compute-intensive
tasks
such
as
drug
discovery,
personalized
medicine,
DNA
sequencing,
medical
imaging,
operational
optimization.
Through
comprehensive
existing
literature,
we
have
taxonomies
across
dimensions,
including
background
enabling
technologies,
applications,
requirements,
architectures,
security,
open
issues,
future
research
directions,
providing
panoramic
view
paradigm
for
healthcare.
Our
aims
aid
new
experienced
researchers
by
helping
them
understand
current
landscape,
identifying
opportunities
challenges,
making
informed
decisions
when
designing
architectures
applications
Fractal and Fractional,
Год журнала:
2023,
Номер
7(12), С. 887 - 887
Опубликована: Дек. 16, 2023
Chaos-based
image
encryption
has
become
a
prominent
area
of
research
in
recent
years.
In
comparison
to
ordinary
chaotic
systems,
fractional-order
systems
tend
have
greater
number
control
parameters
and
more
complex
dynamical
characteristics.
Thus,
an
increasing
researchers
are
introducing
enhance
the
security
chaos-based
encryption.
However,
their
suggested
algorithms
still
suffer
from
some
security,
practicality,
efficiency
problems.
To
address
these
problems,
we
first
constructed
new
3D
Lorenz
system
2D
sinusoidally
constrained
polynomial
hyper-chaotic
map
(2D-SCPM).
Then,
elaborately
developed
multi-image
algorithm
based
on
2D-SCPM
(MIEA-FCSM).
The
introduction
with
fourth
parameter
not
only
enables
MIEA-FCSM
significantly
large
key
space
but
also
enhances
its
overall
security.
Compared
alternatives,
structure
is
simpler
conducive
application
implementation.
our
proposed
MIEA-FCSM,
multi-channel
fusion
initially
reduces
pixels
one-sixth
original.
Next,
after
two
rounds
plaintext-related
random
substitution,
dynamic
diffusion,
fast
scrambling,
fused
pixel
matrix
eventually
encrypted
into
ciphertext
one.
According
numerous
experiments
analyses,
obtained
excellent
scores
for
(2541),
correlation
coefficients
(<0.004),
information
entropy
(7.9994),
NPCR
(99.6098%),
UACI
(33.4659%).
Significantly,
attained
average
rate
as
high
168.5608
Mbps.
Due
superiority
system,
2D-SCPM,
targeted
designs,
outperforms
many
recently
reported
leading
algorithms.
IEEE Access,
Год журнала:
2024,
Номер
12, С. 27530 - 27555
Опубликована: Янв. 1, 2024
In
the
contemporary
landscape,
where
a
huge
amount
of
data
plays
vital
role,
importance
strong
and
robust
cybersecurity
measures
has
become
increasingly
paramount.
This
research
proposes
review
extensively
explores
techniques
within
domain
machine/deep
learning
quantum
techniques,
with
particular
focus
on
cryptographic
methods
methodologies
applied
to
image
encryption.
The
proposed
survey
covers
range
including
random
number
generation,
secure
transmission
images,
watermarking
through
methods,
steganography.
Moreover,
it
encryption,
which
integrates
adversarial
neural
networks,
deep
machine
learning,
transformation
chaotic
networks
that
can
be
used
digital
from
cyber
attacks.
Our
extends
beyond
highlighting
advances
in
investigating
vulnerabilities
existing
techniques.
By
identifying
challenges
weaknesses,
potential
solutions
are
also
presented,
establishing
foundation
for
future
recommendations.
These
suggestions
address
overcome
observed
aim
extensive
analysis
is
provide
understanding
innovative
diverse
approaches
domain.
Simultaneously,
aims
create
roadmap
counter
threats
challenges.
Journal of Software Evolution and Process,
Год журнала:
2025,
Номер
37(2)
Опубликована: Фев. 1, 2025
ABSTRACT
With
the
advent
of
Quantum
Computing
and
its
exponential
research
endeavors
in
past
couple
decades,
we
are
looking
at
a
Golden
Era
Computing.
We
transitioning
into
an
age
Hybrid
Classical‐Quantum
Computers,
where
quantum
computational
resources
selectively
harnessed
for
resource‐intensive
tasks.
On
one
hand,
promises
immense
future
innovation,
it
also
comes
with
privacy
security
challenges.
To
date,
Privacy
by
Design
(PbD)
Security
(SbD)
frameworks
guidelines
Software
Engineering
(QSE)
domain
still
nebulous,
there
no
comprehensive
studies
on
same.
In
this
study,
therefore,
identify
current
state‐of‐the‐art
relevant
literature
investigate
principles
PbD
SbD
QSE.
This
is
first
study
to
Furthermore,
identified
gaps
literature,
which
were
extended
action
points
robust
SbD.
recognize
crucial
role
researchers,
academics,
professionals
field
conducting
more
empirical
shaping