Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
In this paper generation of binary sequences derived from chaotic sequences defined over Z4 is proposed. The six chaotic map equations considered in this paper are Logistic map, Tent Map, Cubic Map, Quadratic Map and Bernoulli Map.... more
    • by 
    •   4  
      Chaotic MapChaotic MapsDS-CDMAStability and Chaos
There is a significant increase in the number of multimedia transmission over the internet is beyond our dreams. Thus, the increased risk of losing or altering the data during transit is more. Protection of this multimedia data becomes... more
    • by 
    •   5  
      Optimal ControlGenetic AlgorithmsIntelligent SystemsChaotic cryptography
This paper presents a novel approach of building a secure data hiding technique in digital images. The image steganography technique takes the advantage of limited power of human visual system (HVS). It uses image as cover media for... more
    • by 
    •   6  
      Dynamical SystemsHuman Visual System - Structure and FunctionImage Processing and steganographyChaotic Maps
    • by 
    •   4  
      Image ProcessingEdge DetectionImage SteganographyChaotic Maps
Bat algorithm (BA) is a recent metaheuristic optimization algorithm proposed by Yang. In the present study, we have introduced chaos into BA so as to increase its global search mobility for robust global optimization. Detailed studies... more
    • by  and +1
    •   7  
      AlgorithmsOptimizationMetaheuristic AlgorithmsBat Algorithm
    • by 
    •   20  
      Dynamical SystemsSocial NetworksPrivacySecurity
    • by 
    •   2  
      Image ProcessingChaotic Maps
As we live and revel in a digital age, the day to day transmission of multimedia data over the internet is beyond our imaginations. Consequently, the increased risk of losing or altering the data during transit is more. Protection of... more
    • by 
    •   3  
      CryptographyChaotic MapsChaotic algorithms
Feature selection (FS) is a challenging problem that attracted the attention of many researchers. FS can be considered as an NP hard problem, If dataset contains N features then 2 N solutions are generated with each additional feature,... more
    • by  and +2
    •   4  
      Dimensionality ReductionChaotic MapsButter y optimization algorithmFeature Se- Lection
Public key cryptography has received great attention in the field of information exchange through insecure channels. In this paper, we combine the Dependent-RSA (DRSA) and chaotic maps (CM) to get a new secure cryptosystem, which depends... more
    • by  and +1
    •   5  
      CryptographyCryptanalysisChaotic MapsPublic key cryptography
    • by 
    •   7  
      EngineeringArtificial Bee Colony AlgorithmPhysical sciencesChaotic Maps
    • by 
    •   4  
      ChaosWavelet TransformImage EncryptionChaotic Maps
This paper presents a novel approach of building a secure data hiding technique in digital images. The image steganography technique takes the advantage of limited power of human visual system (HVS). It uses image as cover media for... more
    • by 
    •   4  
      Dynamical SystemsImage SteganographyChaotic MapsHuman Visual System
    • by 
    •   6  
      Computer ScienceAlgorithmsNetwork SecuritySecurity
The image encryption and decryption is the one of the ways to providing security to digital image. Encryption technique is a process of converting plain image into a cipher image. Decryption technique is a process of converting cipher... more
    • by 
    •   4  
      CommunicationChaotic MapsImplementationGenetic operators
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than... more
    • by 
    •   14  
      GeographyImage ProcessingWatermarkingRobustness Analysis
—Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark's resistance against common processing. Many watermarking schemes emphasize robustness more than... more
    • by 
    •   15  
      Image ProcessingWatermarkingRobustness AnalysisDigital Watermarking
The search for new energy resources is a crucial task nowadays. Research on the use of solar energy is growing every year. The aim is the design of devices that can produce a considerable amount of energy using the Sun's radiation. The... more
    • by  and +1
    •   4  
      Artificial Bee Colony AlgorithmChaotic MapsSolar PVEvolutionary Algorithm
This paper presents the new Lorenz unlike chaotic attractor which is constructed by a three non linear first order differential equations. These equations are arranged in a three dimensional autonomous systems. The dynamic behavior of the... more
    • by 
    •   46  
      Ordinary Differential EquationsPartial Differential EquationsNumerical SimulationsSimulation (Computer Science)
    These paper presents the novel idea about the various image ecryption processes available specifically the encryption of the image by using chaos theory .In the recent age of communication allows us to transfer any of the information... more
    • by 
    •   3  
      Chaotic MapsChaotic Inflation TheoryPixel Shuffling
A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based... more
    • by 
    •   3  
      ChaosImage EncryptionChaotic Maps
Public key cryptography has received great attention in the field of information exchange through insecure channels. In this paper, we combine the Dependent-RSA (DRSA) and chaotic maps (CM) to get a new secure cryptosystem, which depends... more
    • by 
    •   5  
      CryptographyCryptanalysisChaotic MapsPublic key cryptography
    • by 
    •   6  
      Information SecuritySecurityComputer SecurityCryptography
    • by 
    •   13  
      Chaos TheoryChaotic cryptographyChaosCross Correlation
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission.... more
    • by 
    •   41  
      Computer ScienceComputer ArchitectureComputer GraphicsRobotics (Computer Science)
    • by 
    •   4  
      Image ProcessingEdge DetectionImage SteganographyChaotic Maps
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more... more
    • by 
    •   2  
      Digital WatermarkingChaotic Maps