• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643723)   Today's Articles (470)   Subscriber (50640)
For: Wang X, Gao S. Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2019.08.041] [Citation(s) in RCA: 232] [Impact Index Per Article: 58.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Number Cited by Other Article(s)
1
Dai S, Li B, Lu J. Time-optimal open-loop set stabilization of Boolean control networks. Neural Netw 2024;180:106694. [PMID: 39293176 DOI: 10.1016/j.neunet.2024.106694] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/17/2024] [Revised: 08/22/2024] [Accepted: 09/02/2024] [Indexed: 09/20/2024]
2
Li X, Zhang T, Liu M, Fu Y, Zhong H. Achieving Image Encryption Quantum Dot-Functionalized Encryption Camera with Designed Films. ADVANCED SCIENCE (WEINHEIM, BADEN-WURTTEMBERG, GERMANY) 2024;11:e2405667. [PMID: 39101243 PMCID: PMC11481269 DOI: 10.1002/advs.202405667] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/23/2024] [Revised: 06/23/2024] [Indexed: 08/06/2024]
3
Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2023. [DOI: 10.1016/j.jisa.2022.103391] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]
4
Zareai D, Balafar M, FeiziDerakhshi M. EGPIECLMAC: efficient grayscale privacy image encryption with chaos logistics maps and Arnold Cat. EVOLVING SYSTEMS 2023. [DOI: 10.1007/s12530-022-09482-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/03/2023]
5
An D, Hao D, Zhao R, Lu J, Li Y, Zhang Y. A Novel Color Image Privacy-Preserving Method: Combining Breadth and Depth Visual Encryption with Chaotic System. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2023. [DOI: 10.1016/j.jksuci.2023.01.003] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
6
Approximate synchronization of coupled multi-valued logical networks. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.01.057] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/13/2023]
7
Abd-El-Atty B. Quaternion with quantum walks for designing a novel color image cryptosystem. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103367] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
8
Daoui A, Yamni M, Karmouni H, Sayyouri M, Qjidaa H, Ahmad M, A. Abd El-Latif A. Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2022;34:8927-8954. [DOI: 10.1016/j.jksuci.2022.08.021] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
9
Man Z, Li J, Di X, Zhang R, Li X, Sun X. Research on cloud data encryption algorithm based on bidirectional activation neural network. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.11.089] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
10
Gao S, Wu R, Wang X, Liu J, Li Q, Tang X. EFR-CSTP: Encryption for Face Recognition Based on the Chaos and Semi-tensor Product Theory. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.11.121] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/02/2022]
11
Wang Q, Zhang X, Zhao X. Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103340] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
12
Shen H, Shan X, Xu M, Tian Z. A New Chaotic Image Encryption Algorithm Based on Transversals in a Latin Square. ENTROPY (BASEL, SWITZERLAND) 2022;24:1574. [PMID: 36359662 PMCID: PMC9689798 DOI: 10.3390/e24111574] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/05/2022] [Revised: 10/23/2022] [Accepted: 10/27/2022] [Indexed: 06/16/2023]
13
Abu Zitar R, Al-Muhammed MJ. Hybrid encryption technique: Integrating the neural network with distortion techniques. PLoS One 2022;17:e0274947. [PMID: 36170335 PMCID: PMC9518910 DOI: 10.1371/journal.pone.0274947] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/29/2020] [Accepted: 09/07/2022] [Indexed: 11/19/2022]  Open
14
Li D, Li J, Di X. A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103304] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/15/2022]
15
Wang J, Song X, El-Latif AAA. Single-Objective Particle Swarm Optimization-Based Chaotic Image Encryption Scheme. ELECTRONICS 2022;11:2628. [DOI: 10.3390/electronics11162628] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
16
CIE-LSCP: color image encryption scheme based on the lifting scheme and cross-component permutation. COMPLEX INTELL SYST 2022. [DOI: 10.1007/s40747-022-00835-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/15/2022]
17
A Novel Disturbance Rejection Method Based on Robust Sliding Mode Control for the Secure Communication of Chaos-Based System. Symmetry (Basel) 2022. [DOI: 10.3390/sym14081668] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
18
A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.06.011] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
19
Wang X, Liu C, Jiang D. An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.08.002] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
20
Liang Z, Qin Q, Zhou C. An image encryption algorithm based on Fibonacci Q-matrix and genetic algorithm. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07493-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
21
Wang J, Song X, El-Latif AAA. Efficient Entropic Security with Joint Compression and Encryption Approach Based on Compressed Sensing with Multiple Chaotic Systems. ENTROPY 2022;24:e24070885. [PMID: 35885109 PMCID: PMC9324137 DOI: 10.3390/e24070885] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/05/2022] [Revised: 06/22/2022] [Accepted: 06/24/2022] [Indexed: 11/24/2022]
22
Patel S, Veeramalai T. Image Encryption Using a Spectrally Efficient Halton Logistics Tent (HaLT) Map and DNA Encoding for Secured Image Communication. ENTROPY 2022;24:e24060803. [PMID: 35741524 PMCID: PMC9223117 DOI: 10.3390/e24060803] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/23/2022] [Revised: 06/02/2022] [Accepted: 06/03/2022] [Indexed: 12/10/2022]
23
Ahmad M, Agarwal S, Alkhayyat A, Alhudhaif A, Alenezi F, Zahid AH, Aljehane NO. An image encryption algorithm based on new generalized fusion fractal structure. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.01.042] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
24
Erkan U, Toktas A, Toktas F, Alenezi F. 2D eπ-map for image encryption. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2021.12.126] [Citation(s) in RCA: 13] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
25
Analysis and implementation of no-equilibrium chaotic system with application in image encryption. APPL INTELL 2022. [DOI: 10.1007/s10489-021-03071-1] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
26
Protection of image ROI using chaos-based encryption and DCNN-based object detection. Neural Comput Appl 2022. [DOI: 10.1007/s00521-021-06725-w] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
27
Mir UH, Singh D, Lone PN. Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain. INFORMATION SECURITY JOURNAL: A GLOBAL PERSPECTIVE 2022. [DOI: 10.1080/19393555.2021.1963018] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
28
Zhu R, Chen Z, Zhang J, Liu Z. Strategy optimization of weighted networked evolutionary games with switched topologies and threshold. Knowl Based Syst 2022. [DOI: 10.1016/j.knosys.2021.107644] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
29
Wang J, Song X, Wang H, Abd El-Latif AA. Applicable Image Security Based on New Hyperchaotic System. Symmetry (Basel) 2021;13:2290. [DOI: 10.3390/sym13122290] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]  Open
30
A novel key and image concealing with static-dynamic pattern using modified periodic table. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2021.103019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
31
Yavuz E. A new parallel processing architecture for accelerating image encryption based on chaos. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2021.103056] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
32
Wang X, Zhang M. An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.07.096] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
33
Wang X, Liu C, Jiang D. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.06.032] [Citation(s) in RCA: 25] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/28/2023]
34
Zhang M, Tong X, Wang Z, Chen P. Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System. ENTROPY 2021;23:e23081096. [PMID: 34441236 PMCID: PMC8394254 DOI: 10.3390/e23081096] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/07/2021] [Revised: 08/08/2021] [Accepted: 08/16/2021] [Indexed: 11/25/2022]
35
Wang X, Yang J. A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.04.013] [Citation(s) in RCA: 55] [Impact Index Per Article: 18.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
36
CCCIH: Content-consistency Coverless Information Hiding Method Based on Generative Models. Neural Process Lett 2021. [DOI: 10.1007/s11063-021-10582-y] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
37
Ye G, Wu H, Jiao K, Mei D. Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2021;18:5427-5448. [PMID: 34517495 DOI: 10.3934/mbe.2021275] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
38
Kumar CM, Vidhya R, Brindha M. An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02508-x] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
39
Naseer Y, Shah T, Shah D. A novel hybrid permutation substitution base colored image encryption scheme for multimedia data. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2021.102829] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
40
Janani T, Brindha M. A secure medical image transmission scheme aided by quantum representation. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2021.102832] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
41
Jahangir S, Shah T. A novel multiple color image encryption scheme based on algebra M(2, F2[u]/〈u8〉) and chaotic map. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2021.102831] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
42
New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix. ELECTRONICS 2021. [DOI: 10.3390/electronics10091066] [Citation(s) in RCA: 13] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
43
A fixed-time synchronization-based secure communication scheme for two-layer hybrid coupled networks. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2020.12.033] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
44
Charoghchi S, Mashhadi S. Three (t,n)-secret image sharing schemes based on homogeneous linear recursion. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.11.034] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
45
Zhang Y. Statistical test criteria for sensitivity indexes of image cryptosystems. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.10.026] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
46
Xian Y, Wang X. Fractal sorting matrix and its application on chaotic image encryption. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.09.055] [Citation(s) in RCA: 92] [Impact Index Per Article: 30.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
47
Peng W, Cui S, Song C. One-time-pad cipher algorithm based on confusion mapping and DNA storage technology. PLoS One 2021;16:e0245506. [PMID: 33471849 PMCID: PMC7817086 DOI: 10.1371/journal.pone.0245506] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2020] [Accepted: 12/31/2020] [Indexed: 11/21/2022]  Open
48
Wang M, Wang X, Zhao T, Zhang C, Xia Z, Yao N. Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.07.051] [Citation(s) in RCA: 47] [Impact Index Per Article: 15.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
49
Fang D, Sun S. A new secure image encryption algorithm based on a 5D hyperchaotic map. PLoS One 2020;15:e0242110. [PMID: 33180840 PMCID: PMC7661057 DOI: 10.1371/journal.pone.0242110] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/11/2020] [Accepted: 10/26/2020] [Indexed: 11/25/2022]  Open
50
Wang X, Su Y. Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform. Sci Rep 2020;10:18556. [PMID: 33122730 PMCID: PMC7596547 DOI: 10.1038/s41598-020-75562-z] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/26/2020] [Accepted: 10/16/2020] [Indexed: 11/13/2022]  Open
PrevPage 1 of 2 12Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA