Internet is used as the main source of communication throughout the world. However due to public nature of internet data are always exposed to different types of attacks. To address this issue many researchers are working in this area and proposing data encryption techniques. Recently a new substitution box has been proposed for image encryption using many interesting properties like gingerbread-man chaotic map and S8 permutation. But there are certain weaknesses in aforesaid technique which does not provide sufficient security. To resolve the security issue an enhanced version of existing technique is proposed in this paper. Lorenz chaotic map based confusion and diffusion processes in existing technique are employed. Lorenz map is used to...
Due to the network and multimedia application developments, information security become important si...
In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The prop...
Abstract: In recent years, the chaos based cryptographic algorithms have suggested some new and effi...
Internet is used as the main source of communication throughout the world. However due to public nat...
Internet is used as the main source of communication throughout the world. However due to public nat...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sha...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
In this paper, we have presented an image encryption algorithm based on chaotic shuffling map and S-...
A new plaintext-related image encryption system based on the hyper-chaotic Lorenz system is proposed...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integr...
Due to the network and multimedia application developments, information security become important si...
In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The prop...
Abstract: In recent years, the chaos based cryptographic algorithms have suggested some new and effi...
Internet is used as the main source of communication throughout the world. However due to public nat...
Internet is used as the main source of communication throughout the world. However due to public nat...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sha...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
In this paper, we have presented an image encryption algorithm based on chaotic shuffling map and S-...
A new plaintext-related image encryption system based on the hyper-chaotic Lorenz system is proposed...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integr...
Due to the network and multimedia application developments, information security become important si...
In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The prop...
Abstract: In recent years, the chaos based cryptographic algorithms have suggested some new and effi...