Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix

    Hongyu Zhao1,2, Shengsheng Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.068426 - 10 November 2025

    Abstract Driven by advancements in mobile internet technology, images have become a crucial data medium. Ensuring the security of image information during transmission has thus emerged as an urgent challenge. This study proposes a novel image encryption algorithm specifically designed for grayscale image security. This research introduces a new Cantor diagonal matrix permutation method. The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix, where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice (CML). The high initial value sensitivity of the… More >

  • Open Access

    ARTICLE

    Sine-Polynomial Chaotic Map (SPCM): A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks

    David S. Bhatti1,*, Annas W. Malik2, Haeung Choi1, Ki-Il Kim3,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2157-2177, 2025, DOI:10.32604/cmc.2025.068360 - 29 August 2025

    Abstract Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies, limiting their use for lightweight, secure image encryption in resource-constrained Wireless Sensor Networks (WSNs). We propose the SPCM, a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions, leveraging a piecewise function to achieve a broad chaotic range () and a high Lyapunov exponent (5.04). Validated through nine benchmarks, including standard randomness tests, Diehard tests, and Shannon entropy (3.883), SPCM demonstrates superior randomness and high sensitivity to initial conditions. Applied to image encryption, SPCM achieves 0.152582 s (39% faster than some techniques) and 433.42 More >

  • Open Access

    ARTICLE

    Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption

    Fatima Asiri*, Wajdan Al Malwi

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 2053-2077, 2025, DOI:10.32604/cmes.2025.064348 - 30 May 2025

    Abstract Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing. To address these concerns, this paper presents the mathematical and computer modeling of a novel two-dimensional (2D) chaotic system for secure key generation in quantum image encryption (QIE). The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence, named as Trigonometric-Rational-Saturation (TRS) map. Through rigorous mathematical analysis and computational simulations, the map is extensively evaluated for bifurcation behaviour, chaotic trajectories, and Lyapunov exponents. The security evaluation validates the map’s… More >

  • Open Access

    ARTICLE

    Chaos-Based Novel Watermarked Satellite Image Encryption Scheme

    Mohamed Medani1, Yahia Said2, Nashwan Adnan Othman3,4, Farrukh Yuldashev5, Mohamed Kchaou6, Faisal Khaled Aldawood6, Bacha Rehman7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1049-1070, 2025, DOI:10.32604/cmes.2025.063405 - 11 April 2025

    Abstract Satellite images are widely used for remote sensing and defence applications, however, they are subject to a variety of threats. To ensure the security and privacy of these images, they must be watermarked and encrypted before communication. Therefore, this paper proposes a novel watermarked satellite image encryption scheme based on chaos, Deoxyribonucleic Acid (DNA) sequence, and hash algorithm. The watermark image, DNA sequence, and plaintext image are passed through the Secure Hash Algorithm (SHA-512) to compute the initial condition (keys) for the Tangent-Delay Ellipse Reflecting Cavity Map (TD-ERCS), Henon, and Duffing chaotic maps, respectively. Through More >

  • Open Access

    ARTICLE

    Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission

    Haider H. Al-Mahmood1,*, Saad N. Alsaad2

    Intelligent Automation & Soft Computing, Vol.40, pp. 53-74, 2025, DOI:10.32604/iasc.2024.059691 - 10 January 2025

    Abstract In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism… More >

  • Open Access

    ARTICLE

    Chaotic CS Encryption: An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing

    Mingliang Sun, Jie Yuan*, Xiaoyong Li, Dongxiao Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2625-2646, 2024, DOI:10.32604/cmc.2024.050337 - 15 May 2024

    Abstract Images are the most important carrier of human information. Moreover, how to safely transmit digital images through public channels has become an urgent problem. In this paper, we propose a novel image encryption algorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiency of image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSE can fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks, such as differential attacks, and exhibit robustness. First, we use a sparse… More >

  • Open Access

    ARTICLE

    Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System

    Zhiqing Dong1, Zhao Zhang1,*, Hongyan Zhou2, Xuebo Chen2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1977-1993, 2024, DOI:10.32604/cmc.2024.047233 - 27 February 2024

    Abstract With the advent of the information security era, it is necessary to guarantee the privacy, accuracy, and dependable transfer of pictures. This study presents a new approach to the encryption and compression of color images. It is predicated on 2D compressed sensing (CS) and the hyperchaotic system. First, an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security. Then, the processed images are concurrently encrypted and compressed using 2D CS. Among them, chaotic sequences replace traditional random measurement matrices to increase the system’s security. Third, the processed images are More >

  • Open Access

    ARTICLE

    A Novel Approach for Image Encryption with Chaos-RNA

    Yan Hong1,2, Shihui Fang2,*, Jingming Su2, Wanqiu Xu2, Yuhao Wei2, Juan Wu2, Zhen Yang1,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 139-160, 2023, DOI:10.32604/cmc.2023.043424 - 31 October 2023

    Abstract In today’s information society, image encryption technology is crucial to protecting Internet security. However, traditional image encryption algorithms have problems such as insufficient chaotic characteristics, insufficient randomness of keys, and insecure Ribonucleic Acid (RNA) encoding. To address these issues, a chaos-RNA encryption scheme that combines chaotic maps and RNA encoding was proposed in this research. The initial values and parameters of the chaotic system are first generated using the Secure Hash Algorithm 384 (SHA-384) function and the plaintext image. Next, the Lü hyperchaotic system sequence was introduced to change the image’s pixel values to realize… More > Graphic Abstract

    A Novel Approach for Image Encryption with Chaos-RNA

  • Open Access

    ARTICLE

    A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption

    Nashat Salih Abdulkarim Alsandi1, Dilovan Asaad Zebari2,*, Adel Al-Zebari3, Falah Y. H. Ahmed4, Mazin Abed Mohammed5, Marwan Albahar6, Abdulaziz Ali Albahr7,8

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1321-1347, 2023, DOI:10.32604/csse.2023.038089 - 28 July 2023

    Abstract Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks. Thus, the progress of image encryption techniques is becoming an increasingly serious issue and considerable problem. Small space of the key, encryption-based low confidentiality, low key sensitivity, and easily exploitable existing image encryption techniques integrating chaotic system and DNA computing are purposing the main problems to propose a new encryption technique in this study. In our proposed scheme, a three-dimensional Chen’s map and a one-dimensional Logistic map are employed to construct a double-layer image encryption… More >

  • Open Access

    ARTICLE

    A Speech Cryptosystem Using the New Chaotic System with a Capsule-Shaped Equilibrium Curve

    Mohamad Afendee Mohamed1, Talal Bonny2, Aceng Sambas3, Sundarapandian Vaidyanathan4, Wafaa Al Nassan2, Sen Zhang5, Khaled Obaideen2, Mustafa Mamat1, Mohd Kamal Mohd Nawawi6,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5987-6006, 2023, DOI:10.32604/cmc.2023.035668 - 29 April 2023

    Abstract In recent years, there are numerous studies on chaotic systems with special equilibrium curves having various shapes such as circle, butterfly, heart and apple. This paper describes a new 3-D chaotic dynamical system with a capsule-shaped equilibrium curve. The proposed chaotic system has two quadratic, two cubic and two quartic nonlinear terms. It is noted that the proposed chaotic system has a hidden attractor since it has an infinite number of equilibrium points. It is also established that the proposed chaotic system exhibits multi-stability with two coexisting chaotic attractors for the same parameter values but… More >

Displaying 1-10 on page 1 of 17. Per Page