- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Cryptographic Implementations and Security
- Mathematical Dynamics and Fractals
- Biometric Identification and Security
- Coding theory and cryptography
Université Ibn-Tofail
2020-2023
This research endeavor is dedicated to enhancing data confidentiality in internet transmissions by strategically employing Hash functions and harnessing the advantageous attributes of chaos. These attributes, characterized inherent complexity, sensitivity initial conditions, resilience attacks, are foundational elements realm image encryption. The proposed encryption algorithm firmly adheres principles confusion diffusion, thereby constructing a secure framework. Within permutation phase...
Due to the excellent properties of chaotic system and its bounded behavior from a nonlinear system, it appears as pseudo-random noise. It is therefore used camouflage or amalgamate information sent for secure transmission. This document discusses new contribution encryption color images based on two logistic maps with 2D modulated sinusoidal coupling (LSMCL). process goes through several operating cycles. First, we provide procedure generating substitution box using map performing total...
This study is centered on a significant scientific contribution within the realm of image cryptography. The chosen approach involves employing bidimensional Arnold Cat Map transformation to reposition and modify pixel locations, guided by parameters derived from original image. construction multiplicative group Z/nZ, comprising equivalence classes modulo n, relies hyper-chaotic sequence 2D sinusoidal logistic modulation map. correlation between this preceding step yields an unpredictable...
This study signifies the endpoint of thorough cryptographic experimentation, leading to creation an innovative color image encryption scheme. It embodies a fusion mathematical concepts rooted in both group theory and chaos theory.The novel procedure entails cube faces, depict relative positions pixels within given stream, thereby generating six distinct channels. Within our algorithm, each monochromatic layer is independently encrypted using digraph encryption. involves technique rotating...