Achieving Image Encryption Quantum Dot‐Functionalized Encryption Camera with Designed Films
The risk of information leaks increases as images become a crucial medium for information sharing. There is a great need to further develop the versatility of image encryption technology to protect confidential and sensitive information.
Xue Li +4 more
doaj +1 more source
An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map [PDF]
Yanpeng Zhang +3 more
openalex +1 more source
A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. However, most of the proposed methods suffer from slow encryption time or compromise on the security of the encryption to achieve faster encryption.
Yousef Alghamdi +2 more
semanticscholar +1 more source
Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani +4 more
wiley +1 more source
Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption
Optical chaos is a topic of current research characterized by high-dimensional nonlinearity which is attributed to the delay-induced dynamics, high bandwidth and easy modular implementation of optical feedback.
A.P. Misra +46 more
core +1 more source
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding [PDF]
Kaimeng Chen, Chin‐Chen Chang
openalex +1 more source
New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix
In the age of Information Technology, the day-life required transmitting millions of images between users. Securing these images is essential. Digital image encryption is a well-known technique used in securing image content.
Khalid M. Hosny +3 more
semanticscholar +1 more source
Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley +1 more source
Breaking an image encryption algorithm based on chaos
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen ...
Arroyo D. +4 more
core +1 more source
Retracted: Research on High Robust Multimedia Image Encryption Based on Gyrator Transform Domain Model [PDF]
Advances in Multimedia
openalex +1 more source

