In this study, an encryption algorithm that uses chaos based S-BOX is developed for secure and speed image encryption. First of all, a new chaotic system is developed for creating S-Box and image encryption algorithm. Chaos based random number generator is designed with the help of the new chaotic system. Then, NIST tests are run on generated random numbers to verify randomness. A new S-Box design algorithm is developed to create the chaos based S-Box to be utilized in encryption algorithm and performance tests are made. As the next step, the new developed S-Box based image encryption algorithm is introduced in detail. Finally, image encryption application is carried out. To show the quality and strong of the encryption process, security an...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: de...
This article performs the cryptanalysis of an image encryption algorithm using an S-box generated by...
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital...
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital...
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital...
In this study, a novel chaos-based hybrid encryption algorithm design for secure and effective image...
Chaotic systems without equilibrium are of interest because they are the systems with hidden attract...
To solve the shortcomings of traditional cryptography such as 3DES, AES and SM4 in encrypting multim...
Chaotic systems without equilibrium are of interest because they are the systems with hidden attract...
In this paper a number of image encryption algorithms based on chaotic maps has been proposed. Image...
In the context of cryptography applications, using Chaos-based approaches, methods and techniques fo...
The process of encoding any given piece of information or data using a particular selection of avail...
In recent years many DNA approach based encryption algorithms have been suggested but many of them a...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: de...
This article performs the cryptanalysis of an image encryption algorithm using an S-box generated by...
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital...
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital...
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital...
In this study, a novel chaos-based hybrid encryption algorithm design for secure and effective image...
Chaotic systems without equilibrium are of interest because they are the systems with hidden attract...
To solve the shortcomings of traditional cryptography such as 3DES, AES and SM4 in encrypting multim...
Chaotic systems without equilibrium are of interest because they are the systems with hidden attract...
In this paper a number of image encryption algorithms based on chaotic maps has been proposed. Image...
In the context of cryptography applications, using Chaos-based approaches, methods and techniques fo...
The process of encoding any given piece of information or data using a particular selection of avail...
In recent years many DNA approach based encryption algorithms have been suggested but many of them a...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: de...