Hash encryption algorithm structure based on the hybrid Arnold mapping

被引:0
|
作者
Yu, Xiang [1 ]
机构
[1] Chongqing Radio and TV University, Jiulongpo District, Chongqing, China
关键词
D O I
10.4156/ijact.vol4.issue18.64
中图分类号
学科分类号
摘要
引用
收藏
页码:540 / 548
相关论文
共 50 条
  • [41] Hybrid encryption algorithm (HEA) based on chaotic system
    Mimoun Hamdi
    Jamel Miri
    Borhane Moalla
    Soft Computing, 2021, 25 : 1847 - 1858
  • [42] New image encryption scheme based on Arnold map and cuckoo search optimization algorithm
    Khan, Hamza
    Jamal, Sajjad Shaukat
    Hazzazi, Mohammad Mazyad
    Khan, Majid
    Hussain, Iqtadar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (05) : 7419 - 7441
  • [43] Image Encryption Algorithm Based on Chaotic Modulation of Arnold Dual Scrambling and DNA Computing
    Liu, Li
    Zhang, Qiang
    Wei, Xiaopeng
    Zhou, Changjun
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3537 - 3542
  • [44] Image encryption algorithm based on two-value chaotic array and Arnold transformation
    Ge Xin
    Chen Juan
    Luo Xiang-yang
    Liu Fen-lin
    PROCEEDINGS OF 2006 CHINESE CONTROL AND DECISION CONFERENCE, 2006, : 802 - +
  • [45] New image encryption scheme based on Arnold map and cuckoo search optimization algorithm
    Hamza Khan
    Sajjad Shaukat Jamal
    Mohammad Mazyad Hazzazi
    Majid Khan
    Iqtadar Hussain
    Multimedia Tools and Applications, 2023, 82 : 7419 - 7441
  • [46] Image Encryption Algorithm Based on 3D Arnold Cat and Logistic Map
    Pan Tian-gong
    Li Ta-yong
    EQUIPMENT MANUFACTURING TECHNOLOGY AND AUTOMATION, PTS 1-3, 2011, 317-319 : 1537 - 1540
  • [47] Design of Image Encryption Algorithm Based on Different Chaotic Mapping
    Mokhtar, Mohamed A.
    Sadek, Nayra M.
    Mohamed, Amira G.
    2017 34TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2017, : 197 - 204
  • [48] Hash Based Encryption for Keyframes of Diagnostic Hvsteroscopy
    Hamza, Rafik
    Muhammad, Khan
    Arunkumar, N.
    Ramirez-Gonzalez, Gustavo
    IEEE ACCESS, 2018, 6 : 60160 - 60170
  • [49] Encryption and Hash based Security in Internet of Things
    Sundaram, B. Vinayaga
    Ramnath, M.
    Prasanth, M.
    Sundaram, Varsha J.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [50] A PIPELINED IMPLEMENTATION OF THE GROSTL HASH ALGORITHM AND THE ADVANCED ENCRYPTION STANDARD
    Guo, Kai
    Heys, Howard M.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 662 - 665