Results 21 to 30 of about 144 (105)

Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System

open access: yesComplexity, Volume 2022, Issue 1, 2022., 2022
Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages.
Nehal Abd El-Salam Mohamed   +3 more
wiley   +1 more source

Facial Expression Recognition and Beauty Health Management Based on Image Feature Analysis

open access: yesMobile Information Systems, Volume 2022, Issue 1, 2022., 2022
Face recognition can convey a kind of intuitive and rich information to people. With the current Internet security problems becoming more and more prominent today, in order to better effectively guarantee the security of such digital images during Internet transmission, one of the most direct and effective solutions is to recognize the characteristics ...
Shanshan Fu, Binbin Xu, Shadi Aljawarneh
wiley   +1 more source

Computer Vision Operating System of Bank Economic Management Security under 5G Wireless Communication Technology

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
Based on 5G wireless communication technology, this paper proposes a secure online banking payment scheme using a password algorithm and identity authentication+SMS verification code. We use the lightweight block cipher algorithm to construct a numeric permutation table.
Guo Jianluan   +2 more
wiley   +1 more source

Zero‐Correlation Linear Cryptanalysis on SPARX‐64

open access: yesJournal of Sensors, Volume 2021, Issue 1, 2021., 2021
SPARX is a family of ARX‐based block ciphers designed according to the long‐trail strategy, which has 32‐bit ARX‐based SBoxes and has provable bounds against single‐differential and single‐linear cryptanalysis. Since its proposation, some third‐party cryptanalysis methods have been presented. As far as we know, the best attacks against SPARX‐64 covered
Dawei Zhou   +4 more
wiley   +1 more source

Computational Image Encryption Techniques: A Comprehensive Review

open access: yesMathematical Problems in Engineering, Volume 2021, Issue 1, 2021., 2021
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote‐sensing, and medical‐imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification.
Mandeep Kaur   +3 more
wiley   +1 more source

Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design

open access: yesAdvances in Mathematical Physics, Volume 2021, Issue 1, 2021., 2021
This paper provides an in‐depth study and analysis of image processing for graphic design through chaotic encryption combined with a wavelet transform algorithm. Firstly, the traditional Mallat algorithm is optimized; since the mean value of the transform coefficients generated after the wavelet transform of the image is used as the initial value of ...
Yiying Liu, Young Chun Ko, Miaochao Chen
wiley   +1 more source

IMPROVED POLYNOMIAL-TIME PLAINTEXT-RECOVERY ATTACK ON THE MATRIX-BASED KNAPSACK CIPHER

open access: yesРадіоелектронні і комп'ютерні системи, 2020
Asymmetric ciphers are widely used to ensure the confidentiality of data transmission via insecure channels. These cryptosystems allow the interacting parties to create a shared secret key for a symmetric cipher in such a way that an eavesdropper gets no
Олексій Сергійович Вамболь
doaj   +1 more source

Multivariate Profiling of Hulls for Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov   +2 more
doaj   +1 more source

Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Statistical attacks form an important class of attacks against block ciphers. By analyzing the distribution of the statistics involved in the attack, cryptanalysts aim at providing a good estimate of the data complexity of the attack.
Céline Blondeau, Kaisa Nyberg
doaj   +1 more source

A Key Selected S‐Box Mechanism and Its Investigation in Modern Block Cipher Design

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
The block cipher is an important means to provide data confidentiality in reality, and the S‐box is an essential part in most of modern block cipher designs. In 1973, Feistel used a key selected S‐box mechanism in his early block cipher designs, whose idea is to let each S‐box have two different states and use a key bit to select which of the two ...
Jiqiang Lu, Hwajung Seo, Kaitai Liang
wiley   +1 more source

Home - About - Disclaimer - Privacy