2024
DOI: 10.1109/jiot.2024.3376572
|View full text |Cite
|
Sign up to set email alerts
|

Design, Hardware Implementation, and Application in Video Encryption of the 2-D Memristive Cubic Map

Suo Gao,
Herbert Ho-Ching Iu,
Mengjiao Wang
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(1 citation statement)
references
References 52 publications
0
1
0
Order By: Relevance
“…Concurrently, researchers have also found that the characteristics of chaotic systems, such as ergodicity, unpredictability, extreme sensitivity to initial conditions, and pseudo-randomness, are strikingly similar to those of cryptography. Consequently, chaotic systems have found widespread applications in information security, including digital image encryption [13][14][15] and secure communication [16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Concurrently, researchers have also found that the characteristics of chaotic systems, such as ergodicity, unpredictability, extreme sensitivity to initial conditions, and pseudo-randomness, are strikingly similar to those of cryptography. Consequently, chaotic systems have found widespread applications in information security, including digital image encryption [13][14][15] and secure communication [16][17][18].…”
Section: Introductionmentioning
confidence: 99%