This article presents a simple and efficient masking technique based on Chua chaotic system synchronization. It includes feeding the masked signal back to the master system and using it to drive the slave system for synchronization purposes. The proposed system is implemented in a field programmable gate array (FPGA) device using the Xilinx system generator tool. To achieve synchronization, the Pecora-Carroll identical cascading synchronization approach was used. The transmitted signal should be mixed or masked with a chaotic carrier and can be processed by the receiver without any distortion or loss. For different images, the security analysis is performed using the histogram, correlation coefficient, and entropy. In addition, FPGA hardwar...
A systematic methodology is developed for multi-images encryption and decryption and field programma...
In todays world, where most of the transaction, whether business or personal, is done online, protec...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
This article presents a simple and efficient masking technique based on Chua chaotic system synchron...
Image encryption is an important issue in protecting the content of images and in the area of inform...
Today, hardware chip design with FPGA implementation for designing secure crypto processor is a grow...
In recent years, chaos studies have been developing tremendously. The importance of using chaos is i...
AbstractIn this study, the validity and feasibility of UPT chaos for image encryption is demonstrate...
This study aims to design a new architecture of the artificial neural networks (ANNs) using the Xili...
This work presents the hardware demonstrator of a secure encryption system based on synchronised Chu...
In this paper, an FPGA implementation of efficient image encryption algorithm using a chaotic map ha...
This work presents the hardware demonstrator of a secure encryption system based on synchronised Chu...
This paper presents an alternative to secure exchange of encrypted information through public open c...
In This paper, new model of image encryption is designed. This model using stream cipher based on fi...
This study aims to design a new architecture of the artificial neural networks (ANNs) using the Xili...
A systematic methodology is developed for multi-images encryption and decryption and field programma...
In todays world, where most of the transaction, whether business or personal, is done online, protec...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
This article presents a simple and efficient masking technique based on Chua chaotic system synchron...
Image encryption is an important issue in protecting the content of images and in the area of inform...
Today, hardware chip design with FPGA implementation for designing secure crypto processor is a grow...
In recent years, chaos studies have been developing tremendously. The importance of using chaos is i...
AbstractIn this study, the validity and feasibility of UPT chaos for image encryption is demonstrate...
This study aims to design a new architecture of the artificial neural networks (ANNs) using the Xili...
This work presents the hardware demonstrator of a secure encryption system based on synchronised Chu...
In this paper, an FPGA implementation of efficient image encryption algorithm using a chaotic map ha...
This work presents the hardware demonstrator of a secure encryption system based on synchronised Chu...
This paper presents an alternative to secure exchange of encrypted information through public open c...
In This paper, new model of image encryption is designed. This model using stream cipher based on fi...
This study aims to design a new architecture of the artificial neural networks (ANNs) using the Xili...
A systematic methodology is developed for multi-images encryption and decryption and field programma...
In todays world, where most of the transaction, whether business or personal, is done online, protec...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...