Results 41 to 50 of about 3,112,769 (259)
The fragile watermarking technique is used to protect intellectual property rights while also providing security and rigorous protection. In order to protect the copyright of the creators, it can be implanted in some representative text or totem. Because
Guo-Jheng Yang +2 more
doaj +1 more source
Designing Substitution Box Based on the 1D Logistic Map Chaotic System
Many researchers have tried to use the chaotic systems in generating different cryptographic tools, in order to provide high level of security to the data passing through network.
Meryam Saad Fadhil +2 more
openalex +2 more sources
Stability and Fractal Patterns of Complex Logistic Map
The intent of this paper is to study the fractal patterns of one dimensional complex logistic map by finding the optimum values of the control parameter using Ishikawa iterative scheme.
Prasad Bhagwati, Katiyar Kuldip
doaj +1 more source
Weak noise approach to the logistic map
Using a nonperturbative weak noise approach we investigate the interference of noise and chaos in simple 1D maps. We replace the noise-driven 1D map by an area-preserving 2D map modelling the Poincare sections of a conserved dynamical system with ...
B. Shraiman +44 more
core +1 more source
Secure and Fast Image Encryption Algorithm Based on Modified Logistic Map
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day.
Mamoona Riaz +7 more
semanticscholar +1 more source
Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj +1 more source
Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo +3 more
core +2 more sources
Chaos of Exponential Logistic Map
In this paper, chaos of a new exponential logistic map modulated by Gaussian function is investigated. Firstly, the stability of the fixed point is analyzed, and the occurrence of period doubling bifurcation in the system is verified theoretically ...
Li Zhang, Wenhui Yu, Shilong Gao
doaj +1 more source
Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion.
In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed.
G. Ye, Huishan Wu, Kaixin Jiao, Duan Mei
semanticscholar +1 more source
Bifurcations and transitions in the quasiperiodically driven logistic map [PDF]
We discuss several bifurcation phenomena that occur in the quasiperiodically driven logistic map. This system can have strange nonchaotic attractors (SNAs) in addition to chaotic and regular attractors; on SNAs the dynamics is aperiodic, but the largest ...
Negi, Surendra Singh +2 more
core +3 more sources

