ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Chaotic
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Design and Implementation of Sports Network Teaching Platform Based on Discrete Similarity Method
Jian Cui,Lan Shi
#Adaptive savitzky-golay filtering
#chaotic satin bower bird optimization
#multi‐hypothesis fuzzy‐matching radon transform and sports network teaching
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Image Encryption Using Modified Perturbed Logistic Map
Subhashini Kumaran,Amutha Ramachandran
#Improved zig zag transformation
#image encryption
#decoding
#DNA operations
#modified perturbed logistic map
#quaternary DNA encoding
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
New Model of Feature Selection based Chaotic Firefly Algorithm for Arabic Text Categorization
Meryeme Hadni,Hassane Hjiaj
#Chaotic method
#firefly algorithm
#arabic text categorization
#feature selection
Sri Venkateswara College of Engineering, India
#Image encryption
# modular addition
# chaotic maps
# l ogistic map
# socek
# grp
# cross
# block cipher
Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Iran
# CGA
# optimization problem
# chaos evolutionary algor ithm
Spread Spectrum based Invertible Watermarking for Medical Images using RNS and Chaos
#
Encryption Quality Measurement of a Proposed
#
# Chaotic optimization
# GA
# CGA
# SVR
# volatility
Forecasting of Chaotic Time Series Using RBF
Faculty of Engineering and Information Technology, Arab American University, Palestine
#Time series forecasting
# RBF neural networks
# genetic algorithms
# hybrid approach
Jean De Dieu Nkapkop1,2, Joseph Effa1, Monica Borda2, Laurent Bitjoka3, and Alidou Mohamadou4
#Fast and secure encryption
# chaotic sequence
# linear diophantine equation
# NIST test
A Robust Blind Watermarking Scheme for Ownership Assertion of Multi-band Satellite
Department GIS Cell, Motilal Nehru National Institute of Technology, India
#Robust blind watermarking
# ownership information
# chaotic mapping
# convolutional encoding
# viterbi decoding
# normalized cross correlation
# peak signal to noise ratio
(1) A New Chaos-Based Image Encryption Algorithm
Abstract: In this paper, we propose a new image encryption algorithm based on the Compound chaotic image encryption
#Chaotic; image encryption; chosen-plaintext attack; transplantable
Generation of Chaotic Signal for Scrambling Matrix Content
Naziha Khlif, Ahmed Ghorbel, Walid Aydi, and Nouri Masmoudi
#Chaotic signal
# scrambling
# image encryption
Improved Steganography Scheme based on Fractal Set
Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan, Jordan 2Faculty of Computer Studies, Arab Open University, Saudi Arabia
#Steganography
# data hiding
# security
# Julia set
# Mandelbrot set
# and fractal set
A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption
Mahmoud Gad,Esam Hagras,Hasan Soliman,Noha Hikal
#Image encryption
#parallel multi modular chaotic maps
#pseudo-random number generation
#fuzzy logic selector
1
2
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint