Results 41 to 50 of about 3,112,769 (259)

A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection

open access: yesEntropy, 2013
The fragile watermarking technique is used to protect intellectual property rights while also providing security and rigorous protection. In order to protect the copyright of the creators, it can be implanted in some representative text or totem. Because
Guo-Jheng Yang   +2 more
doaj   +1 more source

Designing Substitution Box Based on the 1D Logistic Map Chaotic System

open access: diamondIOP Conference Series: Materials Science and Engineering, 2021
Many researchers have tried to use the chaotic systems in generating different cryptographic tools, in order to provide high level of security to the data passing through network.
Meryam Saad Fadhil   +2 more
openalex   +2 more sources

Stability and Fractal Patterns of Complex Logistic Map

open access: yesCybernetics and Information Technologies, 2014
The intent of this paper is to study the fractal patterns of one dimensional complex logistic map by finding the optimum values of the control parameter using Ishikawa iterative scheme.
Prasad Bhagwati, Katiyar Kuldip
doaj   +1 more source

Weak noise approach to the logistic map

open access: yes, 2004
Using a nonperturbative weak noise approach we investigate the interference of noise and chaos in simple 1D maps. We replace the noise-driven 1D map by an area-preserving 2D map modelling the Poincare sections of a conserved dynamical system with ...
B. Shraiman   +44 more
core   +1 more source

Secure and Fast Image Encryption Algorithm Based on Modified Logistic Map

open access: yesInf.
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day.
Mamoona Riaz   +7 more
semanticscholar   +1 more source

Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]

open access: yesEngineering and Technology Journal, 2019
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj   +1 more source

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]

open access: yes, 2009
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo   +3 more
core   +2 more sources

Chaos of Exponential Logistic Map

open access: yesDiscrete Dynamics in Nature and Society
In this paper, chaos of a new exponential logistic map modulated by Gaussian function is investigated. Firstly, the stability of the fixed point is analyzed, and the occurrence of period doubling bifurcation in the system is verified theoretically ...
Li Zhang, Wenhui Yu, Shilong Gao
doaj   +1 more source

Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion.

open access: yesMathematical biosciences and engineering : MBE, 2021
In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed.
G. Ye, Huishan Wu, Kaixin Jiao, Duan Mei
semanticscholar   +1 more source

Bifurcations and transitions in the quasiperiodically driven logistic map [PDF]

open access: yes, 2000
We discuss several bifurcation phenomena that occur in the quasiperiodically driven logistic map. This system can have strange nonchaotic attractors (SNAs) in addition to chaotic and regular attractors; on SNAs the dynamics is aperiodic, but the largest ...
Negi, Surendra Singh   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy