In this paper, a novel chaotic circuit with one memcapacitor is designed, which has abundant dynamic behaviors. As a potential application, combining the DNA binding mode and the characteristics of the chaotic system, a new image encryption scheme is proposed. Firstly, the original image is processed and generates a set of hash values by the SHA-3 algorithm. The generated hash value and original image are performed XOR operation. The hash values are processed to generate the initial value of the chaotic system by the Hamming distance. Furthermore, the elliptic curve with the hyperchaotic sequence is used to construct the Hill encryption matrix, and the plaintext image is permuted and encrypted. At last, the proposed chaotic system is used t...
In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a c...
In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a c...
Aiming at the problems of small key space and weak resistance to differential attacks in existing en...
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because ...
Existing hyperchaotic systems suffer from a small parameter range and small key space. Therefore, we...
Hundreds of image encryption algorithms have been developed for the security and integrity of images...
In this paper, an improved two-dimensional logistic-sine coupling map (N2D-LSCM) and an improved Hen...
In order to effectively resist the plaintext attacks introduced in recent cryptanalysis literatures,...
This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two...
Image encryption is often used to protect private images during transmission on a public channel. A ...
This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two...
An image encryption algorithm based on DNA-sequences, chaotic dynamics and hash functions is describ...
With the development of national information processes, specific image information from secret depar...
An active charge-controlled memristive Chua’s circuit is implemented, and its basic properties are a...
Memristor is a kind of resistance with a memory function and its special properties decide its broad...
In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a c...
In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a c...
Aiming at the problems of small key space and weak resistance to differential attacks in existing en...
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because ...
Existing hyperchaotic systems suffer from a small parameter range and small key space. Therefore, we...
Hundreds of image encryption algorithms have been developed for the security and integrity of images...
In this paper, an improved two-dimensional logistic-sine coupling map (N2D-LSCM) and an improved Hen...
In order to effectively resist the plaintext attacks introduced in recent cryptanalysis literatures,...
This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two...
Image encryption is often used to protect private images during transmission on a public channel. A ...
This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two...
An image encryption algorithm based on DNA-sequences, chaotic dynamics and hash functions is describ...
With the development of national information processes, specific image information from secret depar...
An active charge-controlled memristive Chua’s circuit is implemented, and its basic properties are a...
Memristor is a kind of resistance with a memory function and its special properties decide its broad...
In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a c...
In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a c...
Aiming at the problems of small key space and weak resistance to differential attacks in existing en...