All Stories

  1. Intelligent recognition of visual speech based on custom CNN and Optimized Quaternion Charlier Moments using PSO
  2. Leveraging Explainable AI, GRU and VAR Based Framework to Uncover Relationships Between Endogenous and Exogenous Volatility Indices for Effective Trading Strategies
  3. A novel bijective substitution box design based on nomadic people optimizer and discrete chaotic map
  4. Cost-Effective PUF and ECC-Based Authentication Protocol for Secure Internet of Drones Communication
  5. A Secure Authentication Framework for Consumer Mobile Crowdsourcing Networks
  6. Robust image encryption scheme based on 6D hyper-chaos and DPA-resistant S-box
  7. A LE-controlled 4D non-degenerate hyperchaotic system and STP-CS model based efficient image encryption algorithm
  8. Corrections to “Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine”
  9. A hybrid approach of substitution and permutation techniques for modern image-cryptosystem
  10. SMOTE-Based Automated PCOS Prediction Using Lightweight Deep Learning Models
  11. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption
  12. Efficient CNN-based disaster events classification using UAV-aided images for emergency response application
  13. Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine
  14. LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things
  15. RAP-MEC: Robust Authentication Protocol for the Mobile Edge Computing Services
  16. Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management
  17. Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis
  18. AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models
  19. Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems
  20. Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing
  21. Enhancing Road Traffic Accident Severity Classification Using the Stacking Method in Machine Learning Models
  22. LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection
  23. Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations
  24. A complex network-based approach for security and governance in the smart green city
  25. A novel algebraic construction of strong S-boxes over double GF(27) structures and image protection
  26. Deep Transfer Learning Based Parkinson’s Disease Detection Using Optimized Feature Selection
  27. Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences
  28. Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
  29. Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things
  30. A new anonymous authentication framework for secure smart grids applications
  31. A novel image encryption scheme based on compressive sensing, elliptic curves and a new jerk oscillator with multistability
  32. Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map
  33. Intelligent Driver Drowsiness Detection for Traffic Safety Based on Multi CNN Deep Model and Facial Subsampling
  34. Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things
  35. A secure and energy efficient key agreement framework for vehicle-grid system
  36. A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map
  37. Decomposition Makes Better Rain Removal: An Enhanced Attention-Guided Image De-raining Using Deconvolutions Network
  38. A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing
  39. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
  40. An image encryption algorithm based on new generalized fusion fractal structure
  41. An FCN-LSTM model for neurological status detection from non-invasive multivariate sensor data
  42. An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
  43. Attention based CNN model for fire detection and localization in real-world images
  44. A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation
  45. A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure
  46. Biomedical Multimedia Encryption by Fractional-Order Meixner Polynomials Map and Quaternion Fractional-Order Meixner Moments
  47. MHGSO: A Modified Hunger Game Search Optimizer Using Opposition-Based Learning for Feature Selection
  48. Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine
  49. PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment
  50. An Integrated  Approach for Cancer Survival Prediction Using Data Mining Techniques
  51. Cryptographic Pseudo-Random Bit Generator Based on New Combination Discrete Chaotic Systems
  52. A group theoretic construction of highly nonlinear substitution box and its applications in image encryption
  53. An Analysis of Depression Detection Model Applying Data Mining Approaches Using Social Network Data
  54. A secure and efficient key agreement framework for critical energy infrastructure using mobile device
  55. A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes
  56. A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption
  57. A Novel Construction of Dynamic S-Box With High Nonlinearity Using Heuristic Evolution
  58. A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
  59. ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids
  60. An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions
  61. Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System
  62. Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function
  63. Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding
  64. Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications
  65. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
  66. Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation
  67. Globalized firefly algorithm and chaos for designing substitution box
  68. An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes
  69. Detecting distraction of drivers using Convolutional Neural Network
  70. A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm
  71. Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme
  72. A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
  73. A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups
  74. A Novel Modular Approach Based Substitution-Box Design for Image Encryption
  75. Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures
  76. Comparison of Pre and Post-Action of a Finite Abelian Group Over Certain Nonlinear Schemes
  77. LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment
  78. Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications
  79. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation
  80. A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation
  81. Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System
  82. Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map
  83. Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption
  84. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes
  85. Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos
  86. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
  87. Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system
  88. ABC Optimization Based Construction of Strong Substitution-Boxes
  89. Cryptanalysis of an image encryption algorithm based on chaotic neural network.
  90. An image encryption approach using particle swarm optimization and chaotic map
  91. A New 1D Chaotic Map and <inline-formula> <tex-math notation="LaTeX">$\beta$ </tex-math> </inline-formula>-Hill Climbing for Generating Substitution-Boxes
  92. Cryptanalysis of Image Cryptosystem Using Synchronized 4D Lorenz Stenflo Hyperchaotic Systems
  93. Real-Time Sign Language Gesture (Word) Recognition from Video Sequences Using CNN and RNN
  94. Dynamic 9 × 9 Substitution-Boxes Using Chaos-Based Heuristic Search
  95. Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series
  96. Heuristic Approach for Nonlinear n × n (3 ≤ n ≤ 7) Substitution-Boxes
  97. A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps
  98. On the Security of Chaos-Based Watermarking Scheme for Secure Communication
  99. Cryptanalysis of an Asymmetric Image Cryptosystem Based on Synchronized Unified Chaotic System and CNN
  100. Chaotic hash function based plain-image dependent block ciphering technique
  101. Breaking an image encryption scheme based on chaotic synchronization phenomenon
  102. Design of chaotic neural network based method for cryptographic substitution box
  103. Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling
  104. Designing Chaotic Chirikov Map-Based Secure Hash Function
  105. PWLCM-Based Random Search for Strong Substitution-Box Design
  106. Designing chaos based strong substitution box
  107. An enhanced modulo-based image encryption using chaotic and fractal keys
  108. Analysis of efficient random permutations generation for security applications
  109. Digital image authentication and encryption using digital signature
  110. A Novel Ant Colony Optimization Based Scheme for Substitution Box Design
  111. A Chaotic Substitution Based Image Encryption Using APA-transformation
  112. A Novel Biometric Fingerprint Template Based Method for Stream Cipher Design
  113. An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems
  114. Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System
  115. Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher
  116. A gray-scale image encryption using Fisher-Yates chaotic shuffling in wavelet domain
  117. A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design
  118. A Novel Approach for Efficient S-Box Design Using Multiple High-Dimensional Chaos
  119. Key Dependent Image Steganography Using Edge Detection
  120. A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data
  121. A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique
  122. Exploring Chaotic Neural Network for Cryptographic Hash Function
  123. Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
  124. Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
  125. A Chaos Based Method for Efficient Cryptographic S-box Design
  126. A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain
  127. Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening
  128. A Framework to Protect Patient Digital Medical Imagery for Secure Telediagnosis
  129. A Ridgelet Based Symmetric Multiple Image Encryption in Wavelet Domain Using Chaotic Key Image
  130. Multiple 3D Chaotic Systems Based Approach for Visual Multimedia Content Protection
  131. Chaos based PN sequence generator for cryptographic applications
  132. A noise resilient scrambling scheme for noisy transmission channel
  133. Chaos-based encryption of biomedical EEG signals using random quantization technique
  134. Collections development of Maulana Azad Library (AMU) and Central Library of University of Delhi
  135. Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform
  136. Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem
  137. Randomness evaluation of stream cipher for secure mobile communication
  138. A Multi-Level Blocks Scrambling Based Chaotic Image Cipher
  139. Digital image encryption based on chaotic map for secure transmission
  140. Enhanced A5/1 cipher with improved linear complexity
  141. Security enhancements in GSM cellular standard