Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2021
DOI: 10.1016/j.vlsi.2021.04.010
|View full text |Cite
|
Sign up to set email alerts
|

Development of micro computer based mobile random number generator with an encryption application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 40 publications
0
5
0
Order By: Relevance
“…The novel use of an Aizawa chaotic map to solve the security and performance issues that many current permutation-diffusion image ciphers suffer from improves security against known/chosen plaintext attacks. The suggested system has been put to the test, and the findings show that it is an effective and efficient approach for sending real-time secure digital images across insecure networks [17]. The paper also proposes a method for encrypting images quickly.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The novel use of an Aizawa chaotic map to solve the security and performance issues that many current permutation-diffusion image ciphers suffer from improves security against known/chosen plaintext attacks. The suggested system has been put to the test, and the findings show that it is an effective and efficient approach for sending real-time secure digital images across insecure networks [17]. The paper also proposes a method for encrypting images quickly.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bifurcation diagrams are important in the analysis of dynamic systems and chaos. Bifurcation analysis is performed to determine the sensitivity of the system to the initial conditions and from where the system has moved from periodicity to chaos [23][24][25]. The bifurcation diagram obtained for the selected control parameters a and d in the state-equations is shown in figure 5.…”
Section: Bifurcation Behavior Analysis Of the Memristor-based Chaotic...mentioning
confidence: 99%
“…The equations of NPCR and UACI are given in (11). For a good encryption process, NPCR value is greater than 99.6% and UACI value is greater than or equal to 30% [23,29,35,36]. The calculated NPRC and UACI values for three encrypted images are given in table 5.…”
Section: Design Of the System On The Labview Platformmentioning
confidence: 99%
“…In recent years, the use of the Internet in daily and business life, the use of social media, and in addition to this, smart production systems, smart home systems, and Internet of things applications that came with the industry 4.0 revolutions have increased considerably. In all of these uses, there is a continuous fow of data [11,12]. Te advancements in information and communication technology have not only transformed various aspects of our daily lives but have also signifcantly broadened the scope of telemedicine.…”
Section: Introductionmentioning
confidence: 99%
“…Instead, chaotic system-based encryption schemes have become more popular due to the good cryptological qualities of chaotic systems, such as their sensitivity to system parameters and initial conditions, nonperiodicity, mixing, and topological transitivity [16][17][18][19]. For this purpose, in the literature, there are various encryption studies based on chaotic systems [12,14,20,21], hyperchaotic systems [22][23][24][25], and chaotic maps [26][27][28]. Due to the abovementioned advantages, chaotic systems have been highly preferred and studied in the encryption of physiological biometric images [14-17, 19, 24, 29, 30].…”
Section: Introductionmentioning
confidence: 99%