Skip Content
You are currently on the new version of our website. Access the old version .

59 Results Found

  • Article
  • Open Access
15 Citations
4,061 Views
22 Pages

Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

  • Mua’ad Abu-Faraj,
  • Abeer Al-Hyari,
  • Charlie Obimbo,
  • Khaled Aldebei,
  • Ismail Altaharwa,
  • Ziad Alqadi and
  • Orabe Almanaseer

This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension privat...

  • Article
  • Open Access
6 Citations
5,028 Views
12 Pages

Nowadays, there is a high necessity to create new and robust cryptosystems. Dynamical systems have promised to develop crypto-systems due to the close relationship between them and the cryptographic requirements. Distributed dynamic encryption (DDE)...

  • Article
  • Open Access
35 Citations
10,406 Views
19 Pages

Pseudorandom Number Generator (PRNG) Design Using Hyper-Chaotic Modified Robust Logistic Map (HC-MRLM)

  • Muhammad Irfan,
  • Asim Ali,
  • Muhammad Asif Khan,
  • Muhammad Ehatisham-ul-Haq,
  • Syed Nasir Mehmood Shah,
  • Abdul Saboor and
  • Waqar Ahmad

Robust chaotic systems, due to their inherent properties of mixing, ergodicity, and larger chaotic parameter space, constitute a perfect candidate for cryptography. This paper reports a novel method to generate random numbers using modified robust lo...

  • Article
  • Open Access
5 Citations
3,753 Views
30 Pages

Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images

  • Abeer Al-Hyari,
  • Mua’ad Abu-Faraj,
  • Charlie Obimbo and
  • Moutaz Alazab

This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory...

  • Article
  • Open Access
37 Citations
3,640 Views
18 Pages

5 September 2023

Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic metho...

  • Article
  • Open Access
21 Citations
4,840 Views
18 Pages

5 November 2023

Image encryption based on chaotic maps is an important method for ensuring the secure communication of digital multimedia on the Internet. To improve the encryption performance and security of image encryption systems, a new image encryption algorith...

  • Article
  • Open Access
6 Citations
2,275 Views
23 Pages

Quad Key-Secured 3D Gauss Encryption Compression System with Lyapunov Exponent Validation for Digital Images

  • Sharad Salunke,
  • Ashok Kumar Shrivastava,
  • Mohammad Farukh Hashmi,
  • Bharti Ahuja and
  • Neeraj Dhanraj Bokde

27 January 2023

High-dimensional systems are more secure than their lower-order counterparts. However, high security with these complex sets of equations and parameters reduces the transmission system’s processing speed, necessitating the development of an alg...

  • Article
  • Open Access
36 Citations
5,888 Views
17 Pages

A Novel Delay Linear Coupling Logistics Map Model for Color Image Encryption

  • Shouliang Li,
  • Weikang Ding,
  • Benshun Yin,
  • Tongfeng Zhang and
  • Yide Ma

14 June 2018

With the popularity of the Internet, the transmission of images has become more frequent. It is of great significance to study efficient and secure image encryption algorithms. Based on traditional Logistic maps and consideration of delay, we propose...

  • Article
  • Open Access
34 Citations
4,933 Views
25 Pages

14 June 2023

The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme that uses chaotic maps and fuzzy numbers for the secure transmission of information. The en...

  • Article
  • Open Access
66 Citations
6,645 Views
30 Pages

Designing 1D Chaotic Maps for Fast Chaotic Image Encryption

  • Mustafa Kamil Khairullah,
  • Ammar Ahmed Alkahtani,
  • Mohd Zafri Bin Baharuddin and
  • Ammar Mohammed Al-Jubari

31 August 2021

Chaotic maps that can provide highly secure key sequences and ease of structure implementation are predominant requirements in image encryption systems. One Dimensional (1D) chaotic maps have the advantage of a simple structure and can be easily impl...

  • Article
  • Open Access
36 Citations
4,990 Views
21 Pages

27 January 2019

Chaos theory has applications in several disciplines and is focusing on the behavior of dynamical systems that are highly sensitive to initial conditions. Chaotic dynamics are the impromptu behavior displayed by some nonlinear dynamical frameworks an...

  • Article
  • Open Access
73 Citations
6,576 Views
25 Pages

23 September 2022

Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. However, most of the proposed methods suffer from slow encryption time or compromise on the security of the encryption to achieve faster encryption. This...

  • Article
  • Open Access
2 Citations
3,284 Views
11 Pages

This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyp...

  • Article
  • Open Access
6 Citations
2,459 Views
14 Pages

13 August 2023

To improve the randomness of the Chebyshev chaotic sequences by coupling the Logistic map and the Chebyshev map, a new one-dimensional Logistic–Chebyshev chaotic map (LCCM) is first presented in this paper. Several tests, including the bifurcat...

  • Article
  • Open Access
10 Citations
3,813 Views
14 Pages

Improvement of Radio Frequency Identification Security Using New Hybrid Advanced Encryption Standard Substitution Box by Chaotic Maps

  • Amira S. El Batouty,
  • Hania H. Farag,
  • Amr A. Mokhtar,
  • El-Sayed A. El-Badawy and
  • Moustafa H. Aly

Radio Frequency Identification (RFID) technology is widely utilized by businesses, organizations and wireless communication systems. RFID technology is secured using different ways of data encryption, e.g., Advanced Encryption Standard (AES). The Sub...

  • Article
  • Open Access
38 Citations
3,280 Views
23 Pages

25 November 2021

In the edge computing and network communication environment, important image data need to be transmitted and stored securely. Under the condition of limited computing resources, it is particularly necessary to design effective and fast image encrypti...

  • Article
  • Open Access
19 Citations
3,875 Views
21 Pages

A Novel Dynamic Mathematical Model Applied in Hash Function Based on DNA Algorithm and Chaotic Maps

  • Nada E. El-Meligy,
  • Tamer O. Diab,
  • Ashraf S. Mohra,
  • Ashraf Y. Hassan and
  • Wageda I. El-Sobky

17 April 2022

This paper aims to improve SHA-512 security without increasing complexity; therefore, we focused on hash functions depending on DNA sequences and chaotic maps. After analysis of 45 various chaotic map types, only 5 types are selected in this proposal...

  • Article
  • Open Access
11 Citations
3,182 Views
22 Pages

30 August 2021

A chaotic system refers to a deterministic system with seemingly random irregular motion, and its behavior is uncertain, unrepeatable, and unpredictable. In recent years, researchers have proposed various image encryption schemes based on a single lo...

  • Article
  • Open Access
75 Citations
3,142 Views
23 Pages

Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption

  • Hongmin Li,
  • Shuqi Yu,
  • Wei Feng,
  • Yao Chen,
  • Jing Zhang,
  • Zhentao Qin,
  • Zhengguo Zhu and
  • Marcin Wozniak

31 July 2023

Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain constraints. To break these constraints, we initially created a two-dimensional enha...

  • Article
  • Open Access
86 Citations
6,198 Views
15 Pages

14 October 2019

Substitution-boxes (S-Boxes) are important non-linear components in block cryptosystem, which play an important role in the security of cryptosystems. Constructing S-Boxes with a strong cryptographic feature is an important step in designing block ci...

  • Article
  • Open Access
10 Citations
6,321 Views
27 Pages

An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing

  • Ankur Khare,
  • Piyush Kumar Shukla,
  • Murtaza Abbas Rizvi and
  • Shalini Stalin

23 May 2016

Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc and ubiquitous computing intelligent systems. Digital Logic Circuits are faster than other computing techniques, so these can be used for fast encrypti...

  • Article
  • Open Access
18 Citations
4,288 Views
29 Pages

25 October 2023

Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA al...

  • Article
  • Open Access
13 Citations
2,584 Views
21 Pages

7 January 2025

In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers. This...

  • Article
  • Open Access
24 Citations
3,439 Views
26 Pages

14 December 2022

This paper proposed an image algorithm based on a cascaded chaotic system to improve the performance of the encryption algorithm. Firstly, this paper proposed an improved cascaded two-dimensional map 2D-Cosine-Logistic-Sine map (2D-CLSM). Cascade cha...

  • Article
  • Open Access
7 Citations
2,934 Views
15 Pages

27 April 2021

Multimedia wireless communications have rapidly developed over the years. Accordingly, an increasing demand for more secured media transmission is required to protect multimedia contents. Image encryption schemes have been proposed over the years, bu...

  • Article
  • Open Access
8 Citations
2,915 Views
16 Pages

13 August 2025

Image encryption plays a critical role in ensuring the confidentiality and integrity of visual information, particularly in applications involving secure transmission and storage. While traditional cryptographic algorithms like AES are widely used, t...

  • Article
  • Open Access
67 Citations
6,808 Views
17 Pages

An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps

  • Sameh S. Askar,
  • Abdel A. Karawia,
  • Abdulrahman Al-Khedhairi and
  • Fatemah S. Al-Ammar

9 January 2019

In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance...

  • Article
  • Open Access
915 Views
20 Pages

28 May 2025

Most image encryption methods based on Rubik’s cube scrambling adopt the idea of cyclic shift or map the image pixels to the cube surface, not fully considering the cube’s three-dimensional (3D) properties. In response to this defect, we...

  • Article
  • Open Access
4 Citations
2,439 Views
20 Pages

31 January 2024

Chaotic maps have been widely studied in the field of cryptography for their complex dynamics. However, chaos-based cryptosystems have not been widely used in practice. One important reason is that the following requirements of practical engineering...

  • Article
  • Open Access
1 Citations
1,322 Views
27 Pages

An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials

  • Chunfu Zhang,
  • Jing Bai,
  • Yanchun Liang,
  • Adriano Tavares,
  • Lidong Wang,
  • Tiago Gomes and
  • Sandro Pinto

2 September 2024

Due to the similar characteristics of chaotic systems and cryptography, public key encryption algorithms based on chaotic systems are worth in-depth research and have high value for the future. Chebyshev polynomials have good properties and are often...

  • Article
  • Open Access
22 Citations
3,522 Views
20 Pages

A K-SVD Based Compressive Sensing Method for Visual Chaotic Image Encryption

  • Zizhao Xie,
  • Jingru Sun,
  • Yiping Tang,
  • Xin Tang,
  • Oluyomi Simpson and
  • Yichuang Sun

30 March 2023

The visually secure image encryption scheme is an effective image encryption method, which embeds an encrypted image into a visual image to realize a secure and secret image transfer. This paper proposes a merging compression and encryption chaos ima...

  • Article
  • Open Access
18 Citations
2,431 Views
20 Pages

Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing

  • Shaista Mansoor,
  • Parsa Sarosh,
  • Shabir A. Parah,
  • Habib Ullah,
  • Mohammad Hijji and
  • Khan Muhammad

10 June 2022

In this paper, we propose an adaptive encryption scheme for color images using Multiple Distinct Chaotic Maps (MDCM) and DNA computing. We have chosen three distinct chaotic maps, including a 2D-Henon map, a Tent map, and a Logistic map, to separatel...

  • Article
  • Open Access
25 Citations
3,290 Views
19 Pages

Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM

  • Heping Wen,
  • Zefeng Chen,
  • Jiehong Zheng,
  • Yiming Huang,
  • Shuwei Li,
  • Linchao Ma,
  • Yiting Lin,
  • Zhen Liu,
  • Rui Li and
  • Huaide Yang
  • + 4 authors

22 September 2022

In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaint...

  • Article
  • Open Access
43 Citations
4,715 Views
25 Pages

23 January 2021

With the development of mobile communication network, especially 5G today and 6G in the future, the security and privacy of digital images are important in network applications. Meanwhile, high resolution images will take up a lot of bandwidth and st...

  • Article
  • Open Access
22 Citations
2,998 Views
28 Pages

To prevent the leakage of image content, image encryption technology has received increasing attention. Most current algorithms are only suitable for the images of certain types and cannot update keys in a timely manner. To tackle such problems, we p...

  • Article
  • Open Access
14 Citations
2,425 Views
25 Pages

Applicable Image Security Based on New Hyperchaotic System

  • Jingya Wang,
  • Xianhua Song,
  • Huiqiang Wang and
  • Ahmed A. Abd El-Latif

1 December 2021

Hyperchaotic systems are widely applied in the cryptography domain on account of their more complex dynamical behavior. In view of this, the greatest contribution of this paper is that a two-dimensional Sine coupling Logistic modulated Sine (2D-SCLMS...

  • Article
  • Open Access
34 Citations
5,476 Views
11 Pages

Chaos-Based Underwater Communication With Arbitrary Transducers and Bandwidth

  • Chao Bai,
  • Hai-Peng Ren,
  • Celso Grebogi and
  • Murilo S. Baptista

24 January 2018

In this work, an enhanced differential chaos shift keying (DCSK), based on a first order hybrid chaotic system, is being proposed for a high reliability underwater acoustic communication system. It can be integrated into systems that use standard exi...

  • Article
  • Open Access
27 Citations
4,343 Views
22 Pages

Joint Image Compression and Encryption Using IWT with SPIHT, Kd-Tree and Chaotic Maps

  • Nasrullah,
  • Jun Sang,
  • Muhammad Azeem Akbar,
  • Bin Cai,
  • Hong Xiang and
  • Haibo Hu

17 October 2018

Confidentiality and efficient bandwidth utilization require a combination of compression and encryption of digital images. In this paper, a new method for joint image compression and encryption based on set partitioning in hierarchical trees (SPIHT)...

  • Article
  • Open Access
11 Citations
3,129 Views
21 Pages

21 July 2023

The demand for cybersecurity is growing to safeguard information flow and enhance data privacy. This essay suggests a novel authenticated public key elliptic curve based on a deep convolutional neural network (APK-EC-DCNN) for cybersecurity image enc...

  • Article
  • Open Access
17 Citations
4,000 Views
25 Pages

Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption

  • Rasha S. Ali,
  • Omar Z. Akif,
  • Sameeh A. Jassim,
  • Alaa Kadhim Farhan,
  • El-Sayed M. El-Kenawy,
  • Abdelhameed Ibrahim,
  • Mohamed E. Ghoneim and
  • Abdelaziz A. Abdelhamid

5 November 2022

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types...

  • Article
  • Open Access
21 Citations
2,969 Views
16 Pages

3 February 2019

It is generally known that the balance between convergence and diversity is a key issue for solving multi-objective optimization problems. Thus, a chaotic multi-objective particle swarm optimization approach incorporating clone immunity (CICMOPSO) is...

  • Article
  • Open Access
2 Citations
1,300 Views
25 Pages

This study presents a novel encryption method for RGB (Red–Green–Blue) color images that combines scrambling techniques with the logistic map equation. In this method, image scrambling serves as a reversible transformation, rendering the...

  • Article
  • Open Access
119 Citations
7,332 Views
17 Pages

An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map

  • Priya Ramasamy,
  • Vidhyapriya Ranganathan,
  • Seifedine Kadry,
  • Robertas Damaševičius and
  • Tomas Blažauskas

3 July 2019

Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential i...

  • Article
  • Open Access
10 Citations
8,848 Views
13 Pages

Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

  • Xianfeng Guo,
  • Jiashu Zhang,
  • Muhammad Khurram Khan and
  • Khaled Alghathbar

27 January 2011

Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withst...

  • Article
  • Open Access
3 Citations
1,038 Views
22 Pages

13 June 2025

The use of UAVs for logistics delivery has become a hot topic in current research, and how to plan a reasonable delivery route is the key to the problem. Therefore, this paper proposes a multi-environment logistics delivery route planning model that...

  • Article
  • Open Access
295 Views
24 Pages

A Novel Dual Color Image Watermarking Algorithm Using Walsh–Hadamard Transform with Difference-Based Embedding Positions

  • Yutong Jiang,
  • Shuyuan Shen,
  • Songsen Yu,
  • Yining Luo,
  • Zhaochuang Lao,
  • Hongrui Wei,
  • Jing Wu and
  • Zhong Zhuang

30 December 2025

Image watermarking is an essential technique for protecting the copyright of digital images. This paper proposes a novel color image watermarking algorithm based on the Walsh–Hadamard Transform (WHT). By analyzing the differences among WHT coef...

  • Article
  • Open Access
165 Views
27 Pages

Dual-Region Encryption Model Based on a 3D-MNFC Chaotic System and Logistic Map

  • Jingyan Li,
  • Yan Niu,
  • Dan Yu,
  • Yiling Wang,
  • Jiaqi Huang and
  • Mingliang Dou

23 January 2026

Facial information carries key personal privacy, and it is crucial to ensure its security through encryption. Traditional encryption for portrait images typically processes the entire image, despite the fact that most regions lack sensitive facial in...

  • Article
  • Open Access
26 Citations
8,812 Views
13 Pages

Digital Watermarking System for Copyright Protection and Authentication of Images Using Cryptographic Techniques

  • Prasanth Vaidya Sanivarapu,
  • Kandala N. V. P. S. Rajesh,
  • Khalid M. Hosny and
  • Mostafa M. Fouda

31 August 2022

Digital images are transferred with ease through the network. Many users are using the images without the knowledge of the owners. Therefore, a novel watermarking scheme is proposed to ensure copyright protection and authentication of images using cr...

  • Article
  • Open Access
81 Views
27 Pages

28 January 2026

In the service-oriented modern society, logistics enterprises focusing solely on cost minimization can no longer meet market demands, as customers place greater emphasis on timely delivery and service satisfaction. Therefore, this paper constructs a...

  • Article
  • Open Access
22 Citations
2,967 Views
18 Pages

A Novel Invariant Based Commutative Encryption and Watermarking Algorithm for Vector Maps

  • Yu Li,
  • Liming Zhang,
  • Xiaolong Wang,
  • Xingang Zhang and
  • Qihang Zhang

Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW method...

of 2