ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Image encryption
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Image Encryption Using Modified Perturbed Logistic Map
Subhashini Kumaran,Amutha Ramachandran
#Improved zig zag transformation
#image encryption
#decoding
#DNA operations
#modified perturbed logistic map
#quaternary DNA encoding
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Sri Venkateswara College of Engineering, India
#Image encryption
# modular addition
# chaotic maps
# l ogistic map
# socek
# grp
# cross
# block cipher
Jean De Dieu Nkapkop1,2, Joseph Effa1, Monica Borda2, Laurent Bitjoka3, and Alidou Mohamadou4
#Fast and secure encryption
# chaotic sequence
# linear diophantine equation
# NIST test
Selective Image Encryption using Singular Value Decomposition and Arnold Transform
volume of digital images. Generally selective cryptosystem encrypts the significant part of the data set while the insignificant
#Arnold transform; confusion-diffusion mechanism; selective image cryptosystem; singular value decomposition
(1) A New Chaos-Based Image Encryption Algorithm
Abstract: In this paper, we propose a new image encryption algorithm based on the Compound chaotic image encryption
#Chaotic; image encryption; chosen-plaintext attack; transplantable
Secure Searchable Image Encryption in Cloud Using Hyper Chaos
Shaheen Ayyub and Praveen Kaushik
#Cloud computing
# encryption
# cloud security
# privacy and integrity
# hyper chaos
# decryption
# logistic map
Generation of Chaotic Signal for Scrambling Matrix Content
Naziha Khlif, Ahmed Ghorbel, Walid Aydi, and Nouri Masmoudi
#Chaotic signal
# scrambling
# image encryption
A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption
Mahmoud Gad,Esam Hagras,Hasan Soliman,Noha Hikal
#Image encryption
#parallel multi modular chaotic maps
#pseudo-random number generation
#fuzzy logic selector
A New Image Encryption Scheme Using Dual Chaotic Map Synchronization
Obaida Al-Hazaimeh1, Mohammad Al-Jamal2, Mohammed Bawaneh1, Nouh Alhindawi3, and Bara’a
#Chaos
# lorenz systems
# chen systems
# synchronization
# cryptography
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint