Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image encryption
biblio
A Cryptographic Confusion Primitive Based on Lotka–Volterra Chaotic System and Its Practical Applications in Image Encryption
Submitted by aekwall on Mon, 01/18/2021 - 10:23am
Scalability
Cryptography
Resiliency
pubcrawl
Metrics
chaos
Image Processing
image encryption
chaotic cryptography
substitution box
cryptographic confusion primitive
cryptographic substitution box structure
image encryption algorithm
Lotka-Volterra chaotic system
substitution box structure
biblio
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve (DCBI-IEC) for Crypto Images
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
Elliptic curve cryptography
user fingerprint image
statistical analysis
Resiliency
public key cryptography
pubcrawl
key sensitivity test
image encryption application
image encryption
IEC
high security level
fingerprint minutia data
fingerprint identification
feature extraction
encryption
Elliptic curves
biometric encryption
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve
differential analysis
decryption processing
DCBI-IEC system
Chaotic maps
chaotic logistic map
chaotic cryptography
chaotic communication
chaos
biometrics (access control)
biometric identity
biometric digital identity
Metrics
Scalability
resilience
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
image encryption
probability density
optimized henon mapping
optimized henon
new 2d-logistic chaotic System
Lyapunov exponents
image encryption schema
image cryptosystem
hybrid optimized chaotic system
henon chaotic system
compounded chaotic system
chaotic image encryption algorithm
2D logistic chaotic system
Henon mapping
chaotic cryptography
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Security analysis
Image coding
Correlation
optimisation
Logistics
composability
pubcrawl
Resiliency
encryption
biblio
Image Encryption Algorithm Based on Hyper-chaotic Lorenz Map and Compressed Sensing Theory
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
digital image encryption algorithm
Control Theory
random matrix design
multidimensional chaotic system
motion state
motion process
measurement matrix
image encryption
image compression
hyper-chaotic Lorenz map
Hadamard matrix
Hadamard matrices
encryption sequence
Cryptography
compressed sensing theory
chaotic sequence
Sparse matrices
image motion analysis
digital images
Image coding
chaos
compressed sensing
pubcrawl
security
encryption
biblio
Image Encryption and Decryption using Enigma Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
highly advanced technologies
secured procedure
secured image processing
Rotors
Resiliency
resilience
red intensity
pubcrawl
pixel
original RGB value
military communication
Mathematical model
image security
image encryptions
image encryption
image colour analysis
Algorithm
green intensity
enigma machine
enigma algorithm
enigma
encryption
encrypting decrypting images
efficient encryption
decryption
cyber-physical systems
Cryptography
computationally efficient procedure
composability
Breadboard
blue intensity
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
An Efficient Image Encryption Using Chaos Theory
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
Image coding
turmoil hypothesis
section astute rearranging
Resiliency
resilience
push savvy rearranging
pubcrawl
pixel substitution
pixel shuffling
pixel replacement
pixel rearranging
Indexes
image encryption
bit-XOR activity
Entropy
encryption
efficient encryption
disorder hypothesis
decryption
cyber-physical systems
Cryptography
control systems
Conferences
composability
chaos theory
chaos
biblio
DNA and Chaos Based Confusion-Diffusion for Color Image Security
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
image encryption
multimedia files
image pixels
DNA XOR rules
DNA decoding
DNA coding
Diffusion
deoxyribo nucleic acid coding
confusion-diffusion process
Confusion
confused image
column shuffling
colour image encryption
color image security
chaos aided inter-planar row
DNA cryptography
Cryptography
Histograms
chaos
image colour analysis
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
5D Combined Chaotic System for Image Encryption with DNA Encoding and Scrambling
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
DNA cryptography
UACI
tent map
sine map
pixel scrambling
NPCR
logistics map
Henon map
entropy values
DNA scrambling
DNA complementary function
bit scrambling
5D combined chaotic system
5D Chaotic system
DNA encryption
DNA encoding
Cryptography
image sequences
chaotic sequences
image encryption
Histograms
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
A Dual Layer Image Encryption using Polymerase Chain Reaction Amplification and DNA Encryption
Submitted by aekwall on Mon, 06/22/2020 - 10:27am
encoding
unauthorized data access
polymers
polymerase chain reaction amplification
image protection
dual layer image encryption
DNA encryption
digital image security
biological sequences
binary encoding
biocomputing
DNA cryptography
cryptographic algorithms
image encryption
authorisation
Predictive Metrics
digital images
DNA
privacy
Image coding
Data protection
pubcrawl
Human behavior
Resiliency
encryption
Data Security
Cryptography
« first
‹ previous
1
2
3
4
next ›
last »