Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access


    A Cross-Plane Color Image Encryption Algorithm Based on 1D-SLM

    Xiaohong Wang, Huiqing Wu, Yuying Ma, Shuzhen Huang*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1093-1108, 2023, DOI:10.32604/csse.2023.036652

    Abstract With the rapid development of 5G technology, it has become fast and easy for people to transmit information on the Internet. Digital images can express information more intuitively, so transmitting information through images has excellent applications. This paper uses a new chaotic system called 1D-Sin-Logistic-Map (1D-SLM). 1D-SLM has two control parameters, which can provide larger parameter space, and the parameter space in the chaotic state is continuous. Through Lyapunov exponent analysis (LE), bifurcation diagrams analysis, spectral entropy analysis (SE), and 0-1 test, it is verified that 1D-SLM has complex dynamic behavior and is very suitable for cryptography. Compared with other… More >

  • Open Access


    A Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption

    Yongsheng Hu*, Liyong Nan

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6555-6571, 2023, DOI:10.32604/cmc.2023.036090

    Abstract The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem. The classical chaotic map has simple dynamic behavior and few control parameters, so it is not suitable for modern cryptography. In this paper, we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map (2D-SSCDB). The 2D-SSCDB has a simple structure but has complex dynamic behavior. The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior, and the parameter space in the hyperchaotic state is extensive and continuous. Trajectory analysis and some randomness tests verify that… More >

  • Open Access


    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

    Iman Almomani1,2, Walid El-Shafai1,3,*, Aala AlKhayer1, Albandari Alsumayt4, Sumayh S. Aljameel5, Khalid Alissa6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3515-3537, 2023, DOI:10.32604/cmc.2023.033765

    Abstract Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users’ biometrics is still a hot research area to be investigated. This work presents a powerful biometric security system (BSS) to protect different biometric modalities such as faces, iris, and fingerprints. The proposed BSS model is based on hybridizing auto-encoder (AE) network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy. The employed… More >

  • Open Access


    A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity

    S. Hanis*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 865-878, 2023, DOI:10.32604/iasc.2023.030597

    Abstract In the recent past, the storage of images and data in the cloud has shown rapid growth due to the tremendous usage of multimedia applications. In this paper, a modulated version of the Ikeda map and key generation algorithm are proposed, which can be used as a chaotic key for securely storing images in the cloud. The distinctive feature of the proposed map is that it is hyperchaotic, highly sensitive to initial conditions, and depicts chaos over a wide range of control parameter variations. These properties prevent the attacker from detecting and extracting the keys easily. The key generation algorithm… More >

  • Open Access


    Intelligent Cybersecurity Classification Using Chaos Game Optimization with Deep Learning Model

    Eatedal Alabdulkreem1, Saud S. Alotaibi2, Mohammad Alamgeer3,4, Radwa Marzouk5, Anwer Mustafa Hilal6,*, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Mohammed Rizwanullah6

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 971-983, 2023, DOI:10.32604/csse.2023.030362

    Abstract Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years. Both Machine Learning (ML) and Deep Learning (DL) classification models are useful in effective identification and classification of cyberattacks. In addition, the involvement of hyper parameters in DL models has a significantly influence upon the overall performance of the classification models. In this background, the current study develops Intelligent Cybersecurity Classification using Chaos Game Optimization with Deep Learning (ICC-CGODL) Model. The goal of the proposed ICC-CGODL model is to recognize and categorize different kinds of attacks made upon data. Besides, ICC-CGODL model primarily… More >

  • Open Access


    Numerical Study of Natural Convection in an Inclined Porous Cavity

    Saad Adjal1,*, Sabiha Aklouche-Benouaguef1, Belkacem Zeghmati2

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.5, pp. 1389-1397, 2022, DOI:10.32604/fdmp.2022.021619

    Abstract Two-dimensional transient laminar natural convection in a square cavity containing a porous medium and inclined at an angle of 30∘ is investigated numerically. The vertical walls are differentially heated, and the horizontal walls are adiabatic. The effect of Rayleigh number on heat transfer and on the road to chaos is analyzed. The natural heat transfer and the Darcy Brinkman equations are solved by using a finite volume method and a Tri Diagonal Matrix Algorithm (TDMA). The results are obtained for a porosity equal to 0.45, a Darcy number and a Prandtl respectively equal to 10−3 and 0.71; they are analyzed… More >

  • Open Access


    A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos

    Muhammad Islam Kamran1, Muazzam A. Khan1, Suliman A. Alsuhibany2, Yazeed Yasin Ghadi3, Arshad4, Jameel Arif1, Jawad Ahmad5,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 657-672, 2022, DOI:10.32604/cmc.2022.028876

    Abstract The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a secure way. Instead of the classical random walk, this paper proposes the quantum walk to achieve high image security. Classical random walk exhibits randomness due to the stochastic transitions between states, on the other hand, the quantum walk is more random and achieve randomness due… More >

  • Open Access


    A Secure and Lightweight Chaos Based Image Encryption Scheme

    Fadia Ali Khan1, Jameel Ahmed1, Fehaid Alqahtani2, Suliman A. Alsuhibany3, Fawad Ahmed4, Jawad Ahmad5,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 279-294, 2022, DOI:10.32604/cmc.2022.028789

    Abstract In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffusion. The proposed scheme containing both confusion and diffusion modules are highly secure and effective as compared to the existing schemes. Initially, an image (red, green, and blue components) is partitioned into blocks with an equal number of pixels. Each block is then processed with Tinkerbell Chaotic Map (TBCM) to get shuffled pixels and shuffled blocks. Composite Fractal Function (CFF) change the value of pixels of each color component (layer) to obtain a random… More >

  • Open Access


    Resource Load Prediction of Internet of Vehicles Mobile Cloud Computing

    Wenbin Bi1, Fang Yu2, Ning Cao3,*, Russell Higgs4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 165-180, 2022, DOI:10.32604/cmc.2022.027776

    Abstract Load-time series data in mobile cloud computing of Internet of Vehicles (IoV) usually have linear and nonlinear composite characteristics. In order to accurately describe the dynamic change trend of such loads, this study designs a load prediction method by using the resource scheduling model for mobile cloud computing of IoV. Firstly, a chaotic analysis algorithm is implemented to process the load-time series, while some learning samples of load prediction are constructed. Secondly, a support vector machine (SVM) is used to establish a load prediction model, and an improved artificial bee colony (IABC) function is designed to enhance the learning ability… More >

  • Open Access


    Image Encryption Using Multi-Scroll Attractor and Chaotic Logistic Map

    R. Anitha*, B. Vijayalakshmi

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3447-3463, 2022, DOI:10.32604/cmc.2022.021519

    Abstract In the current scenario, data transmission over the network is a challenging task as there is a need for protecting sensitive data. Traditional encryption schemes are less sensitive and less complex thus prone to attacks during transmission. It has been observed that an encryption scheme using chaotic theory is more promising due to its non-linear and unpredictable behavior. Hence, proposed a novel hybrid image encryption scheme with multi-scroll attractors and quantum chaos logistic maps (MSA-QCLM). The image data is classified as inter-bits and intra-bits which are permutated separately using multi scroll attractor & quantum logistic maps to generate random keys.… More >

Displaying 11-20 on page 2 of 44. Per Page