Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (50)
  • Open Access

    ARTICLE

    A New Multi Chaos-Based Compression Sensing Image Encryption

    Fadia Ali Khan1, Jameel Ahmed1, Suliman A. Alsuhibany2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 437-453, 2023, DOI:10.32604/cmc.2023.032236

    Abstract The advancements in technology have substantially grown the size of image data. Traditional image encryption algorithms have limited capabilities to deal with the emerging challenges in big data, including compression and noise toleration. An image encryption method that is based on chaotic maps and orthogonal matrix is proposed in this study. The proposed scheme is built on the intriguing characteristics of an orthogonal matrix. Gram Schmidt disperses the values of pixels in a plaintext image by generating a random orthogonal matrix using logistic chaotic map. Following the diffusion process, a block-wise random permutation of the More >

  • Open Access

    ARTICLE

    A Chaotic Pulse Train Generator Based on Henon Map

    Babu H. Soumya1,*, N. Vijayakumar2, K. Gopakumar3

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1197-1207, 2023, DOI:10.32604/iasc.2023.031575

    Abstract The Henon map forms one of the most-studied two-dimensional discrete-time dynamical systems that exhibits chaotic behavior. The Henon map takes a point in the plane and maps it to a new point . In this paper, a chaotic pulse generator based on the chaotic Henon map is proposed. It consists of a Henon map function subcircuit to realize the Henon map and another subcircuit to perform the iterative operation. The Henon map subcircuit comprises operational amplifiers, multipliers, delay elements and resistors, whereas, the iterative subcircuit is implemented with a simple design that comprises of an More >

  • Open Access

    ARTICLE

    A Speech Cryptosystem Using the New Chaotic System with a Capsule-Shaped Equilibrium Curve

    Mohamad Afendee Mohamed1, Talal Bonny2, Aceng Sambas3, Sundarapandian Vaidyanathan4, Wafaa Al Nassan2, Sen Zhang5, Khaled Obaideen2, Mustafa Mamat1, Mohd Kamal Mohd Nawawi6,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5987-6006, 2023, DOI:10.32604/cmc.2023.035668

    Abstract In recent years, there are numerous studies on chaotic systems with special equilibrium curves having various shapes such as circle, butterfly, heart and apple. This paper describes a new 3-D chaotic dynamical system with a capsule-shaped equilibrium curve. The proposed chaotic system has two quadratic, two cubic and two quartic nonlinear terms. It is noted that the proposed chaotic system has a hidden attractor since it has an infinite number of equilibrium points. It is also established that the proposed chaotic system exhibits multi-stability with two coexisting chaotic attractors for the same parameter values but… More >

  • Open Access

    ARTICLE

    An Improved Elite Slime Mould Algorithm for Engineering Design

    Li Yuan1, Jianping Ji1, Xuegong Liu1, Tong Liu2, Huiling Chen3, Deng Chen4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 415-454, 2023, DOI:10.32604/cmes.2023.026098

    Abstract The Swarm intelligence algorithm is a very prevalent field in which some scholars have made outstanding achievements. As a representative, Slime mould algorithm (SMA) is widely used because of its superior initial performance. Therefore, this paper focuses on the improvement of the SMA and the mitigation of its stagnation problems. For this aim, the structure of SMA is adjusted to develop the efficiency of the original method. As a stochastic optimizer, SMA mainly stimulates the behavior of slime mold in nature. For the harmony of the exploration and exploitation of SMA, the paper proposed an… More > Graphic Abstract

    An Improved Elite Slime Mould Algorithm for Engineering Design

  • Open Access

    ARTICLE

    A Color Image Encryption Scheme Based on Singular Values and Chaos

    Adnan Malik1, Muhammad Ali1, Faisal S. Alsubaei2, Nisar Ahmed3,*, Harish Kumar4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 965-999, 2023, DOI:10.32604/cmes.2023.022493

    Abstract The security of digital images transmitted via the Internet or other public media is of the utmost importance. Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities. This study provides an approach to color image encryption that could find practical use in various contexts. The proposed method, which combines four chaotic systems, employs singular value decomposition and a chaotic sequence, making it both secure and compression-friendly. The unified average change intensity, the number of pixels’ change rate, information More >

  • Open Access

    ARTICLE

    An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher

    Ghofran Kh. Shraida1, Hameed A. Younis1, Taief Alaa Al-Amiedy2, Mohammed Anbar2,*, Hussain A. Younis3,4, Iznan H. Hasbullah2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2641-2654, 2023, DOI:10.32604/cmc.2023.035793

    Abstract Nowadays, high-resolution images pose several challenges in the context of image encryption. The encryption of huge images’ file sizes requires high computational resources. Traditional encryption techniques like, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) are not only inefficient, but also less secure. Due to characteristics of chaos theory, such as periodicity, sensitivity to initial conditions and control parameters, and unpredictability. Hence, the characteristics of deoxyribonucleic acid (DNA), such as vast parallelism and large storage capacity, make it a promising field. This paper presents an efficient color image encryption method utilizing DNA encoding with… More >

  • Open Access

    ARTICLE

    A Cross-Plane Color Image Encryption Algorithm Based on 1D-SLM

    Xiaohong Wang, Huiqing Wu, Yuying Ma, Shuzhen Huang*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1093-1108, 2023, DOI:10.32604/csse.2023.036652

    Abstract With the rapid development of 5G technology, it has become fast and easy for people to transmit information on the Internet. Digital images can express information more intuitively, so transmitting information through images has excellent applications. This paper uses a new chaotic system called 1D-Sin-Logistic-Map (1D-SLM). 1D-SLM has two control parameters, which can provide larger parameter space, and the parameter space in the chaotic state is continuous. Through Lyapunov exponent analysis (LE), bifurcation diagrams analysis, spectral entropy analysis (SE), and 0-1 test, it is verified that 1D-SLM has complex dynamic behavior and is very suitable More >

  • Open Access

    ARTICLE

    A Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption

    Yongsheng Hu*, Liyong Nan

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6555-6571, 2023, DOI:10.32604/cmc.2023.036090

    Abstract The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem. The classical chaotic map has simple dynamic behavior and few control parameters, so it is not suitable for modern cryptography. In this paper, we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map (2D-SSCDB). The 2D-SSCDB has a simple structure but has complex dynamic behavior. The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior, and the parameter space in the hyperchaotic state is extensive and continuous. Trajectory analysis and… More >

  • Open Access

    ARTICLE

    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

    Iman Almomani1,2, Walid El-Shafai1,3,*, Aala AlKhayer1, Albandari Alsumayt4, Sumayh S. Aljameel5, Khalid Alissa6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3515-3537, 2023, DOI:10.32604/cmc.2023.033765

    Abstract Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users’ biometrics is still a hot research area to be investigated. This work presents a powerful biometric security system (BSS) to protect different biometric modalities such as faces, iris, and fingerprints. The proposed BSS model is based on hybridizing auto-encoder (AE) network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and… More >

  • Open Access

    ARTICLE

    A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity

    S. Hanis*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 865-878, 2023, DOI:10.32604/iasc.2023.030597

    Abstract In the recent past, the storage of images and data in the cloud has shown rapid growth due to the tremendous usage of multimedia applications. In this paper, a modulated version of the Ikeda map and key generation algorithm are proposed, which can be used as a chaotic key for securely storing images in the cloud. The distinctive feature of the proposed map is that it is hyperchaotic, highly sensitive to initial conditions, and depicts chaos over a wide range of control parameter variations. These properties prevent the attacker from detecting and extracting the keys… More >

Displaying 11-20 on page 2 of 50. Per Page