Results 21 to 30 of about 144 (105)
Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System
Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages.
Nehal Abd El-Salam Mohamed +3 more
wiley +1 more source
Facial Expression Recognition and Beauty Health Management Based on Image Feature Analysis
Face recognition can convey a kind of intuitive and rich information to people. With the current Internet security problems becoming more and more prominent today, in order to better effectively guarantee the security of such digital images during Internet transmission, one of the most direct and effective solutions is to recognize the characteristics ...
Shanshan Fu, Binbin Xu, Shadi Aljawarneh
wiley +1 more source
Based on 5G wireless communication technology, this paper proposes a secure online banking payment scheme using a password algorithm and identity authentication+SMS verification code. We use the lightweight block cipher algorithm to construct a numeric permutation table.
Guo Jianluan +2 more
wiley +1 more source
Zero‐Correlation Linear Cryptanalysis on SPARX‐64
SPARX is a family of ARX‐based block ciphers designed according to the long‐trail strategy, which has 32‐bit ARX‐based SBoxes and has provable bounds against single‐differential and single‐linear cryptanalysis. Since its proposation, some third‐party cryptanalysis methods have been presented. As far as we know, the best attacks against SPARX‐64 covered
Dawei Zhou +4 more
wiley +1 more source
Computational Image Encryption Techniques: A Comprehensive Review
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote‐sensing, and medical‐imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification.
Mandeep Kaur +3 more
wiley +1 more source
Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design
This paper provides an in‐depth study and analysis of image processing for graphic design through chaotic encryption combined with a wavelet transform algorithm. Firstly, the traditional Mallat algorithm is optimized; since the mean value of the transform coefficients generated after the wavelet transform of the image is used as the initial value of ...
Yiying Liu, Young Chun Ko, Miaochao Chen
wiley +1 more source
IMPROVED POLYNOMIAL-TIME PLAINTEXT-RECOVERY ATTACK ON THE MATRIX-BASED KNAPSACK CIPHER
Asymmetric ciphers are widely used to ensure the confidentiality of data transmission via insecure channels. These cryptosystems allow the interacting parties to create a shared secret key for a symmetric cipher in such a way that an eavesdropper gets no
Олексій Сергійович Вамболь
doaj +1 more source
Multivariate Profiling of Hulls for Linear Cryptanalysis
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov +2 more
doaj +1 more source
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis
Statistical attacks form an important class of attacks against block ciphers. By analyzing the distribution of the statistics involved in the attack, cryptanalysts aim at providing a good estimate of the data complexity of the attack.
Céline Blondeau, Kaisa Nyberg
doaj +1 more source
A Key Selected S‐Box Mechanism and Its Investigation in Modern Block Cipher Design
The block cipher is an important means to provide data confidentiality in reality, and the S‐box is an essential part in most of modern block cipher designs. In 1973, Feistel used a key selected S‐box mechanism in his early block cipher designs, whose idea is to let each S‐box have two different states and use a key bit to select which of the two ...
Jiqiang Lu, Hwajung Seo, Kaitai Liang
wiley +1 more source

