- Full text PDF available (2)
- This year (0)
- Last 5 years (0)
- Last 10 years (6)
Journals and Conferences
Chaotic systems are extremely sensitive to control parameters and initial conditions. This feature is effective in the field of cryptography. In this paper we propose image encryption scheme which is based on the chaotic maps of Peter de Jong's attractor. The image is transferred into the wavelet domain and then appropriate modifications of the wavelet… (More)
We present an automated approach to prove termination of Java Bytecode (JBC) programs by automatically transforming them to term rewrite systems (TRSs). In this way, the numerous techniques and tools developed for TRS termination can now be used for imperative object-oriented languages like Java, which can be compiled into JBC.
—It is commonly known that chaotic systems are extremely sensitive to initial parameters and these systems can be very helpful in the field of cryptography from this reason. Logistic maps of deterministic chaos can be used for the generation of encryption key. This key is then used for the image encryption. This paper proposes usage of chaotic encryption… (More)