Open Access
Issue
BIO Web Conf.
Volume 97, 2024
Fifth International Scientific Conference of Alkafeel University (ISCKU 2024)
Article Number 00070
Number of page(s) 6
DOI https://doi.org/10.1051/bioconf/20249700070
Published online 05 April 2024
  • H. Y. Zhengmao, et al., “Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis” Applied System Innovation, 1(4), (2018). [Google Scholar]
  • H. Nasry, et al., “Multi Chaotic System to Generate Novel S-Box for Image Encryption”, in 11th International Conference on Mathematics and Engineering Physics (ICMEP-11) 2022. [Google Scholar]
  • O. Jallouli, “Chaos-based security under real-time and energy constraints for the Internet of Things”, PhD. Thesis, Signal and Image processing, Universite de Nantes, Franc, 2017. [Google Scholar]
  • Ping, P., Xu, F., Mao, Y., Wang, Z.: Designing permutation-substitution image encryption networks with henon map. Neurocomputing 283, 53–63 (2018). [CrossRef] [Google Scholar]
  • A. Kadhim, “New image encryption based on pixel mixing and generating chaos system”, Al-Qadisiyah journal of pure science, (2020). [Google Scholar]
  • M. S. Fadhil, et al., “Designing Substitution Box Based on the 1D Logistic Map Chaotic”, in International Scientific Conference of Engineering Sciences (ISCES 2020). [Google Scholar]
  • H. Demirci and N. Yurtay, “Effect of the Chaotic Crossover Operator on Breeding Swarms Algorithm”, Sakarya University Journal of Computer and Information Sciences, 4(1):120–130, April 2021. [CrossRef] [Google Scholar]
  • T.K. Alshekl, y E.A. Albhrany, “A New Key Stream Generator Based on 3D Hénon map and 3D Cat map ”, IJSER, Vol. 8, pp. 2114–2120, January 2017. [Google Scholar]
  • M. S. Azzaz, C. Tanougast, S. Sadoudi, and A. Bouridane, “Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 8, pp. 2035–2047, Aug. 2013, DOI: 10.1016/j.cnsns.2012.12.018. [CrossRef] [Google Scholar]
  • A. Hasheminejad and M. J. Rostami, “A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map,” Optik, Vol. 184, pp. 205–213, May 2019, DOI: 10.1016/j.ijleo.2019.03.065. [CrossRef] [Google Scholar]
  • A. Alfalou, C. Brosseau, and N. Abdallah, “Simultaneous compression and encryption of color video imag es,” Optics Communications, Vol. 338, pp. 371–379, Mar. 2015, DOI: 10.1016/j.optcom.2014.10.020 [CrossRef] [Google Scholar]
  • H. Elkamchouchi, W. M. Salama, and Y. Abouelseoud, “New video encryption schemes based on chaotic maps,” IET Image Processing, 14, no. 2, pp. 397–406, Feb. 2020, DOI: 10.1049/iet-ipr.2018.5250. [CrossRef] [Google Scholar]
  • F. Sbiaa, S. Kotel, M. Zeghid, R. Tourki, M. Machhout, and A. Baganne, “A selective encryption scheme with multiple security levels for the H.264/AVC video coding standard,” in 2016 IEEE International Conference on Computer and Information Technology (CIT), Dec. 2016, pp. 391–398, DOI: 10.1109/CIT.2016.53. [CrossRef] [Google Scholar]
  • P. McLaren, W. J. Buchanan, G. Russell, and Z. Tan, “Deriving ChaCha20 key streams from targeted memory analysis,” Journal of Information Security and Applications, Vol. 48, Oct. 2019, DOI: 10.1016/j.jisa.2019.102372. [CrossRef] [Google Scholar]
  • A. M. Raheema; S. B. Sadkhan ; S.M. Abdul Sattar, Performance Comparison of Hybrid Chaotic Maps Based on Speech Scrambling for OFDM Techniques”, 2018 Third Scientific Conference of Electrical Engineering (SCEE). [Google Scholar]
  • H. A. Ismael; S. B. Sadkhan, “Security enhancement of speech scrambling using triple Chaotic Maps”, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT). [Google Scholar]
  • F. Özkaynak, “Cryptographically secure random number generator with chaotic additional input,” Nonlinear Dyn., 2014. [Google Scholar]
  • Shoaib Ansari, Prof. Neelesh Gupta, Prof. Sudhir Agrawal, A Review on Chaotic Map Based Cryptography, International Journal of Scientific Engineering and Technology, 2012. [Google Scholar]
  • Shoaib Ansari, Neelesh Gupta, Sudhir Agrawal, An Image Encryption Approach Using Chaotic Map in Frequency Domain, 2012. [Google Scholar]
  • N. S. Raghava & Ashish Kumar, IMAGE ENCRYPTION USING HENON CHAOTIC MAP WITH BYTE SEQUENCE, International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN(P): 2249-6831; ISSN(E): 2249-7943Vol. 3, Issue 5, Dec 2013, 11–18. [Google Scholar]
  • Amina Mahdi, Saad Saffah Hreshee, Design and implementation of voice encryption system using XOR based on Hénon map, DOI: 10.1109/AIC-MITCSA.2016.7759915, 2016. [Google Scholar]
  • Ekhlas Abbas Albahrani, Tayseer Karam Alshekly, A New Key Stream Generator Based on 3D Henon map and 3D Cat map, International Journal of Scientific and Engineering Research 8(1):2114, 2017. [Google Scholar]
  • Pranjali Sankhe, Shruti Pimple, Surabhi Singh, Anita Lahane, An Image Cryptography using Henon Map and Arnold Cat Map, International Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue: 04 | Apr-2018. [Google Scholar]
  • Ala'a Talib Khudhair and Abeer Tariq Maolood, Towards Generating a New Strong key for AES Encryption Method Depending on 2D Henon Map, Diyala Journal for Pure Science, 2018. [Google Scholar]
  • Ekhlas Abbas Albahrani, A Combination of Two-Dimensional Hénon Map and Two-Dimensional Rational Map as Key Number Generator, December 2019 DOI: 10.1109/CAS47993.2019.9075731 Conference: 2019 First International Conference of Computer and Applied Sciences (CAS) [Google Scholar]
  • Ansam Sabah, Shaymaa Hameed, Maisa’a Abid Ali Key Generation Based on Henon Map and Lorenz System, Al-Mustansiriyah Journal of Science ISSN: 1814-635X (print), ISSN:2521-3520, Volume 31, Issue 1, 2020. [Google Scholar]
  • Daniel Murillo-Escobar • Miguel Ángel Murillo-Escobar • César Cruz-Hernández • Adrian Arellano-Delgado • Rosa Martha López-Gutiérrez, Pseudorandom number generator based on novel 2D Hénon-Sine hyperchaotic map with microcontroller implementation, under exclusive licence to Springer Nature B.V. 2022 [Google Scholar]
  • Mohamed G. Abdelfattah, Salem F. Hegazy, Nihal Fayez, S. Obayya, Optical cryptosystem for visually meaningful encrypted images based on gyrator transform and Hénon map, Optical and Quantum Electronics • January 2022. [Google Scholar]
  • Ala'a Talib Khudhair, Ekhlas Khalaf Gbashi, Abeer Tariq Maolood, “A Noval Dynamic S-Box based on password Key and Circle Map”, Iraqi Journal of Science (IJS). 2023. [Google Scholar]
  • Ekhlas K. Gbashi, Abeer Tariq Maolood, Yaseen Naser Jurn “Privacy Security System for Video Data Transmission in Edge-Fog-cloud Environment”, International Journal of Intelligent Engineering and Systems, vol.16, No.2, 2023. [Google Scholar]
  • Abeer Tariq Maolood, Ekhlas Khalaf Gbashi, Eman Shakir Mahmood, “Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map”, International Journal of Electrical and Computer Engineering (IJECE), 12, no. 5, October 2022. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.