Results 1 to 10 of about 44,446 (241)

Medical Image Encryption Based on Josephus Traversing and Hyperchaotic Lorenz System. [PDF]

open access: yesJ Shanghai Jiaotong Univ Sci, 2022
This study proposes a new medical image encryption scheme based on Josephus traversing and hyperchaotic Lorenz system. First, a chaotic sequence is generated through hyperchaotic system.
Yang N, Zhang S, Bai M, Li S.
europepmc   +3 more sources

A Novel and Fast Encryption System Based on Improved Josephus Scrambling and Chaotic Mapping. [PDF]

open access: yesEntropy (Basel), 2022
To address the shortcomings of weak confusion and high time complexity of the existing permutation algorithms, including the traditional Josephus ring permutation (TJRP), an improved Josephus ring-based permutation (IJRBP) algorithm is developed.
Guan Z   +5 more
europepmc   +3 more sources

Chaotic encryption algorithm with scrambling diffusion based on the Josephus cycle

open access: yesFrontiers in Physics, 2023
Digital images are characterized by high redundancy and strong interpixel correlation. Breaking the correlation between data and improving sensitivity are crucial to protecting image information.
Huijie Zhang   +3 more
doaj   +4 more sources

Image-to-Image Steganography with Josephus Permutation and Least Significant Bit (LSB) 3-3-2 Embedding

open access: yesApplied Sciences
In digital image security, the Josephus permutation is widely used in cryptography to enhance randomness. However, its application in steganography is underexplored. This study introduces a novel method integrating the Josephus permutation into the LSB 3-
Muhammad Rafly Yanuar   +3 more
doaj   +4 more sources

An Effective Image Encryption Method Based on Space Filling Curve and Plaintext-Related Josephus Traversal

open access: yesIEEE Access, 2020
To improve the effectiveness and security of image encryption, this article proposes an image encryption scheme based on a Y-index Space Filling Curve (SFC) and variable step Josephus traversal. The scheme adopts a confusion-diffusion structure. First, a
Ying Niu, Xuncai Zhang
doaj   +4 more sources

An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map

open access: yesIEEE Access, 2018
This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key stream generation process; three-round scrambling process; and one-round diffusion process ...
Xingyuan Wang   +2 more
doaj   +4 more sources

A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy. [PDF]

open access: yesSci Rep
With the rapid growth in the exchange of digital data, the problem of protecting images has become essential, particularly in sectors such as medicine, surveillance and secure communications.
Ghouate NE   +8 more
europepmc   +2 more sources

An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem

open access: yesInternational Journal of Optics, 2020
In this paper, an image encryption algorithm based on a hyperchaotic system and variable-step Josephus problem is proposed. Based on an in-depth analysis of the classic Josephus problem, a new variable-step Josephus problem that combines the pseudorandom
Xuncai Zhang   +4 more
doaj   +2 more sources

Strong s-box construction approach based on Josephus problem

open access: yesSoft Computing
There are two basic requirements for symmetric encryption algorithms. The first of these is diffusion. The second and most important is confusion. In these algorithms, this requirement is usually met by s-box structures.
Fırat Artuğer
exaly   +2 more sources

Josephus Nim [PDF]

open access: yesNotes on Number Theory and Discrete Mathematics
In this study, we propose a variant of Nim that uses two piles. In the first pile, we have stones with a weight of a, and in the second pile, we have stones with a weight of -2a, where a is a natural number.
Shoei Takahashi   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy