نتایج جستجو برای: multiple chaotic maps
تعداد نتایج: 879192 فیلتر نتایج به سال:
Everybody wants to maintain solitariness some extent or entirely in his dealings with other people during different modes of communication. To retain privacy, researchers materialized distinct image encryption algorithms using chaotic maps. Due their extraordinary features, most employed multidimensional maps barricade clandestine information digital images from potential invaders. Still, have ...
This paper proposes a new symmetric cryptographic system using chaotic systems. The basic idea is that random strand generated from functions. developed merged with the obtained original image. researcher used tables called multiple encryption in composition of these strands. These are produced according to specific pattern. combination algorithm randomly selects table set and performs operatio...
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identitybased digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the ECM-IBE scheme is based on the hardness assumption of chaotic maps-based decisional DiffieHellman (CDDH) problem, whereas the ECM-IDS scheme is secure based on the difficulties of chaotic maps-based ...
This paper discuss the utilization of the complex chaotic dynamics given by the selected time-continuous chaotic systems as well as by the discrete chaotic maps, as the chaotic pseudo random number generators and driving maps for the chaos based optimization. Such an optimization concept is utilizing direct output iterations of chaotic system transferred into the required numerical range or it ...
A chaotic map has various features. A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by the iterations of a chaotic map. These features looks similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. The chaotic cryptosystem is researched as an application of cha...
this paper presents a review of Image cryptography techniques based on chaotic maps. The chaotic cryptography is gaining more attention than others because of its lower mathematical complexity & better Security. It also avoids the data spreading hence reduces the transmission cost & delay. The digital image cryptography which is based on chaotic systems utilizes the discrete non-linear system d...
Complex dynamics of chaotic maps under an infinite-precision mathematical framework have been well known. The case in a finite-precision computer remains to be further explored. Previous work treated a digital chaotic map as a black box and gave different explanations according to the test results of the output. Using the Logistic map as a typical example, we disclose some dynamical properties ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید