Results 11 to 20 of about 1,121 (233)
A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps
In recent years, the chaos-based cryptographic algorithms have attracted a lot of attention. Specially, chaotic tent map (CTM)-based schemes show some good performances in randomness properties and security level.
Xiaolin Wu +3 more
doaj +2 more sources
In recent years, chaos-based image encryption algorithms have aroused extensive research interest. However, some image encryption algorithms still have several security defects, and the research on cryptanalysis is relatively inadequate.
Congxu Zhu, Kehui Sun
doaj +2 more sources
Blockchain driven medical image encryption employing chaotic tent map in cloud computing
Data security during transmission over public networks has become a key concern in an era of rapid digitization. Image data is especially vulnerable since it can be stored or transferred using public cloud services, making it open to illegal access ...
Usman Shahid +5 more
doaj +2 more sources
Chaotical PRNG based on composition of logistic and tent maps using deep-zoom [PDF]
We proposed the deep zoom analysis of the composition of the logistic map and the tent map, which are well-known discrete unimodal chaotic maps. The deep zoom technique transforms each point of a given chaotic orbit by removing its first k-digits after ...
J. Alvarenga +2 more
semanticscholar +1 more source
Statistical stability for Barge-Martin attractors derived from tent maps [PDF]
Let $\{f_t\}_{t\in(1,2]}$ be the family of core tent maps of slopes $t$. The parameterized Barge-Martin construction yields a family of disk homeomorphisms $\Phi_t\colon D^2\to D^2$, having transitive global attractors $\Lambda_t$ on which $\Phi_t$ is ...
P. Boyland +2 more
semanticscholar +1 more source
Improvement of Chacha20 Algorithm based on Tent and Chebyshev Chaotic Maps
Chacha 20 is a stream cypher that is used as lightweight on many CPUs that do not have dedicated AES instructions. As stated by Google, that is the reason why they use it on many devices, such as mobile devices, for authentication in TLS protocol. This
M. H. Taha, J. M. Al-Tuwaijari
semanticscholar +1 more source
Allowed Patterns of Symmetric Tent Maps via Commuter Functions [PDF]
We introduce a new technique to study pattern avoidance in dynamical systems, namely the use of a commuter function between non-conjugate dynamical systems.
Kassie Archer, Scott M. LaLonde
semanticscholar +1 more source
Itineraries for Inverse Limits of Tent Maps: a Backward View [PDF]
Previously published admissibility conditions for an element of { 0 , 1 } Z to be the itinerary of a point of the inverse limit of a tent map are expressed in terms of forward orbits.
P. Boyland +2 more
semanticscholar +1 more source
Robustly correlated key‐medical image for DNA‐chaos based encryption
Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement.
Ichraf Aouissaoui +2 more
doaj +1 more source
Investigation of the difference between Chaos Degree and Lyapunov exponent for asymmetric tent maps
Lyapunov exponent is commonly used as a measure of chaos. Chaos Degree is propsed as another measure of chaos based on information theory. The advantage of Chaos Degree is that it is calculable from data.
Tomoyuki Mao +2 more
semanticscholar +1 more source

