All Stories

  1. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption
  2. Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine
  3. LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things
  4. Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis
  5. AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models
  6. Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems
  7. Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing
  8. Enhancing Road Traffic Accident Severity Classification Using the Stacking Method in Machine Learning Models
  9. LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection
  10. Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations
  11. A complex network-based approach for security and governance in the smart green city
  12. A novel algebraic construction of strong S-boxes over double GF(27) structures and image protection
  13. Deep Transfer Learning Based Parkinson’s Disease Detection Using Optimized Feature Selection
  14. Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences
  15. Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
  16. Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things
  17. A new anonymous authentication framework for secure smart grids applications
  18. A novel image encryption scheme based on compressive sensing, elliptic curves and a new jerk oscillator with multistability
  19. Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map
  20. Intelligent Driver Drowsiness Detection for Traffic Safety Based on Multi CNN Deep Model and Facial Subsampling
  21. Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things
  22. A secure and energy efficient key agreement framework for vehicle-grid system
  23. A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map
  24. Decomposition Makes Better Rain Removal: An Enhanced Attention-Guided Image De-raining Using Deconvolutions Network
  25. A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing
  26. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
  27. An image encryption algorithm based on new generalized fusion fractal structure
  28. An FCN-LSTM model for neurological status detection from non-invasive multivariate sensor data
  29. An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
  30. Attention based CNN model for fire detection and localization in real-world images
  31. A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation
  32. A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure
  33. Biomedical Multimedia Encryption by Fractional-Order Meixner Polynomials Map and Quaternion Fractional-Order Meixner Moments
  34. MHGSO: A Modified Hunger Game Search Optimizer Using Opposition-Based Learning for Feature Selection
  35. Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine
  36. PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment
  37. An Integrated  Approach for Cancer Survival Prediction Using Data Mining Techniques
  38. Cryptographic Pseudo-Random Bit Generator Based on New Combination Discrete Chaotic Systems
  39. A group theoretic construction of highly nonlinear substitution box and its applications in image encryption
  40. An Analysis of Depression Detection Model Applying Data Mining Approaches Using Social Network Data
  41. A secure and efficient key agreement framework for critical energy infrastructure using mobile device
  42. A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes
  43. A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption
  44. A Novel Construction of Dynamic S-Box With High Nonlinearity Using Heuristic Evolution
  45. A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
  46. ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids
  47. An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions
  48. Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System
  49. Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function
  50. Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding
  51. Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications
  52. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
  53. Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation
  54. Globalized firefly algorithm and chaos for designing substitution box
  55. An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes
  56. Detecting distraction of drivers using Convolutional Neural Network
  57. A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm
  58. Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme
  59. A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
  60. A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups
  61. A Novel Modular Approach Based Substitution-Box Design for Image Encryption
  62. Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures
  63. Comparison of Pre and Post-Action of a Finite Abelian Group Over Certain Nonlinear Schemes
  64. LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment
  65. Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications
  66. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation
  67. A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation
  68. Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System
  69. Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map
  70. Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption
  71. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes
  72. Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos
  73. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
  74. Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system
  75. ABC Optimization Based Construction of Strong Substitution-Boxes
  76. Cryptanalysis of an image encryption algorithm based on chaotic neural network.
  77. An image encryption approach using particle swarm optimization and chaotic map
  78. A New 1D Chaotic Map and <inline-formula> <tex-math notation="LaTeX">$\beta$ </tex-math> </inline-formula>-Hill Climbing for Generating Substitution-Boxes
  79. Cryptanalysis of Image Cryptosystem Using Synchronized 4D Lorenz Stenflo Hyperchaotic Systems
  80. Real-Time Sign Language Gesture (Word) Recognition from Video Sequences Using CNN and RNN
  81. Dynamic 9 × 9 Substitution-Boxes Using Chaos-Based Heuristic Search
  82. Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series
  83. Heuristic Approach for Nonlinear n × n (3 ≤ n ≤ 7) Substitution-Boxes
  84. A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps
  85. On the Security of Chaos-Based Watermarking Scheme for Secure Communication
  86. Cryptanalysis of an Asymmetric Image Cryptosystem Based on Synchronized Unified Chaotic System and CNN
  87. Chaotic hash function based plain-image dependent block ciphering technique
  88. Breaking an image encryption scheme based on chaotic synchronization phenomenon
  89. Design of chaotic neural network based method for cryptographic substitution box
  90. Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling
  91. Designing Chaotic Chirikov Map-Based Secure Hash Function
  92. Designing chaos based strong substitution box
  93. An enhanced modulo-based image encryption using chaotic and fractal keys
  94. Analysis of efficient random permutations generation for security applications
  95. A Novel Ant Colony Optimization Based Scheme for Substitution Box Design
  96. A Novel Biometric Fingerprint Template Based Method for Stream Cipher Design
  97. An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems
  98. Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher
  99. A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design
  100. A Novel Approach for Efficient S-Box Design Using Multiple High-Dimensional Chaos
  101. Key Dependent Image Steganography Using Edge Detection
  102. A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data
  103. Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
  104. Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
  105. A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain
  106. Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening
  107. A Framework to Protect Patient Digital Medical Imagery for Secure Telediagnosis
  108. Multiple 3D Chaotic Systems Based Approach for Visual Multimedia Content Protection
  109. Chaos based PN sequence generator for cryptographic applications
  110. A noise resilient scrambling scheme for noisy transmission channel
  111. Chaos-based encryption of biomedical EEG signals using random quantization technique
  112. Collections development of Maulana Azad Library (AMU) and Central Library of University of Delhi
  113. Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform
  114. Randomness evaluation of stream cipher for secure mobile communication
  115. A Multi-Level Blocks Scrambling Based Chaotic Image Cipher
  116. Enhanced A5/1 cipher with improved linear complexity
  117. Security enhancements in GSM cellular standard