4.7 Article

Meaningful data encryption scheme based on newly designed chaotic map and P-tensor product compressive sensing in WBANs

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm

Abdurrahim Toktas et al.

Summary: In this study, a novel 2D fully chaotic map (FULLMAP) derived through a multi-objective optimization strategy with artificial bee colony (ABC) algorithm is introduced for image encryption procedures (IMEPs). FULLMAP demonstrates superior performance in various measurements and does not require any optimization in the encryption procedures, making it faster than reported procedures. The encryption performance of FULLMAP through IMEPs was verified with respect to various cryptanalyses and showed better results compared to other studies.

NEURAL COMPUTING & APPLICATIONS (2022)

Article Mathematics, Interdisciplinary Applications

Hidden coexisting hyperchaos of new memristive neuron model and its application in image encryption

Qiang Lai et al.

Summary: This paper presents a novel neuron model by coupling a memristor to obtain a memristive neuron model. The study shows that memristor can enhance the chaos complexity of the discrete neuron, resulting in hyperchaos. Additionally, a new encryption scheme for image encryption is proposed, which exhibits excellent security characteristics.

CHAOS SOLITONS & FRACTALS (2022)

Article Computer Science, Information Systems

2D eπ-map for image encryption

Ugur Erkan et al.

Summary: This study presents an image encryption algorithm (IEA) using a novel 2D chaotic map called e pi-map, which is based on Euler and Pi numbers. The e pi-map utilizes the infinite diversity attribute of these numbers and a diffusion operation called bit reversion to manipulate pixel values. The algorithm is extensively evaluated through various cryptanalysis techniques and compared with recent literature, demonstrating its superior performance in terms of ergodicity, complexity, and randomness.

INFORMATION SCIENCES (2022)

Article Engineering, Electrical & Electronic

Double Parameters Fractal Sorting Matrix and Its Application in Image Encryption

Yongjin Xian et al.

Summary: This article creatively introduces the concept and related proofs of double parameters fractal sorting matrix (DPFSM) and presents a 2×2 DPFSM iterative generation method. DPFSM is a matrix classification with self-similar structures, which solves the limitation of calculation accuracy in information security algorithms.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Computer Science, Software Engineering

A new one-dimensional cosine polynomial chaotic map and its use in image encryption

Mohamed Zakariya Talhaoui et al.

Summary: This paper introduces a new real one-dimensional cosine polynomial (1-DCP) chaotic map and demonstrates its application in designing a new efficient image encryption scheme (1-DCPIE). By optimizing the encryption processing unit and using parallel permutation instead of sequential substitution, the encryption speed is significantly improved while maintaining a higher level of security.

VISUAL COMPUTER (2021)

Article Computer Science, Information Systems

An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing

Xiuli Chai et al.

Summary: A novel double color image encryption algorithm combining 2D compressive sensing with an embedding technique is proposed in this paper, achieving compression and encryption simultaneously and obtaining visually meaningful cipher images. Confusion of the compressed cipher images is done by index sequences generated from a 6D hyperchaotic system, while the relationship of the algorithm with plain images is enhanced by embedding feature parameters into the carrier image.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Cy: Chaotic yolo for user intended image encryption and sharing in social media

Meysam Asgari-Chenaghlu et al.

Summary: Social media platforms may not provide adequate security for selective media sharing, but a novel method based on YoloV3 object detection and chaotic image encryption offers a solution to user intended data preservation issues with superior performance compared to existing methods.

INFORMATION SCIENCES (2021)

Article Engineering, Electrical & Electronic

Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing

Zhongyun Hua et al.

Summary: In this work, a new visually secure image encryption scheme is proposed to improve the quality of reconstructed image, processing efficiency, and security level through adaptive-thresholding sparsification, parallel CS technique, and matrix encoding strategy. The proposed scheme shows higher efficiency and quality in simulations and comparisons.

SIGNAL PROCESSING (2021)

Article Engineering, Electrical & Electronic

Adaptive embedding: A novel meaningful image encryption scheme based on parallel compressive sensing and slant transform

Donghua Jiang et al.

Summary: This paper proposes a novel image encryption and embedding algorithm by combining multiple techniques to achieve visually secure image encryption. By optimizing the processing of sparse matrices and embedding methods, high-quality cipher images are obtained.

SIGNAL PROCESSING (2021)

Article Computer Science, Hardware & Architecture

A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model

Min-Yan Tsai et al.

Summary: Encryption technology plays a crucial role in data security, with varying levels of complexity in different encryption methods. While most Internet of Things (IoT) devices use symmetric encryption due to limited computing power, it may lead to weak keys. A Genetic Algorithm-based symmetric key generation method has been proposed to enhance data security in the IoT environment.

MOBILE NETWORKS & APPLICATIONS (2021)

Article Optics

A sensitive dynamic mutual encryption system based on a new 1D chaotic map

Mohamed Amine Midoun et al.

Summary: This research paper introduces a novel one-dimensional chaotic system 1-DFCS based on the fraction of cosine over sine and a sensitive dynamic mutual image encryption scheme SDME utilizing 1-DFCS. The scheme incorporates a new sensitivity function and a mutual part encryption technique, achieving high security level and time efficiency.

OPTICS AND LASERS IN ENGINEERING (2021)

Article Engineering, Mechanical

An image encryption scheme based on an optimal chaotic map derived by multi-objective optimization using ABC algorithm

Abdurrahim Toktas et al.

Summary: A novel optimal chaotic map (OCM) is proposed for image encryption scheme, constructed using a multi-objective optimization strategy through artificial bee colony (ABC) algorithm. The OCM shows better chaotic attributes in evaluation analyses and does not require optimization in the encrypting operation, making it faster than other optimization-based encryption schemes.

NONLINEAR DYNAMICS (2021)

Article Computer Science, Information Systems

A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme

Ali Mansouri et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

A New Asymmetrical Encryption Algorithm Based on Semitensor Compressed Sensing in WBANs

Zhongfeng Niu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations

Li-ping Chen et al.

FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2020)

Article Engineering, Electrical & Electronic

A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding

Liya Zhu et al.

SIGNAL PROCESSING (2020)

Article Computer Science, Hardware & Architecture

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

Yannan Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Engineering, Electrical & Electronic

A visually secure image encryption scheme based on parallel compressive sensing

Hui Wang et al.

SIGNAL PROCESSING (2019)

Article Computer Science, Information Systems

Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks

Lixiang Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

P-Tensor Product in Compressed Sensing

Haipeng Peng et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

A visually secure image encryption scheme based on compressive sensing

Xiuli Chai et al.

SIGNAL PROCESSING (2017)

Article Engineering, Electrical & Electronic

Efficient Certificateless Access Control for Wireless Body Area Networks

Fagen Li et al.

IEEE SENSORS JOURNAL (2016)

Article Computer Science, Artificial Intelligence

Embedding cryptographic features in compressive sensing

Yushu Zhang et al.

NEUROCOMPUTING (2016)

Article Telecommunications

An Energy Efficient Method for Secure and Reliable Data Transmission in Wireless Body Area Networks Using RelAODV

Kanaga Suba Raja et al.

WIRELESS PERSONAL COMMUNICATIONS (2015)