Claim Missing Document
Check
Articles

Found 3 Documents
Search

A novel one-dimensional chaotic map with improved sine map dynamics Htiti, Mohamed; Akharraz, Ismail; Ahaitouf, Abdelaziz
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2128-2137

Abstract

These days, keeping information safe from people who should not have access to it is very important. Chaos maps are a critical component of encryption and security systems. The classical one-dimensional maps, such as logistic, sine, and tent, have many weaknesses. For example, these classical maps may exhibit chaotic behavior within the narrow range of the rate variable between 0 and 1and the small interval's rate variable. In recent years, several researchers have tried to overcome these problems. In this paper, we propose a new one-dimensional chaotic map that improves the sine map. We introduce an additional parameter and modify the mathematical structure to enhance the chaotic behavior and expand the interval's rate variable. We evaluate the effectiveness of our map using specific tests, including fixed points and stability analysis, Lyapunov exponent analysis, diagram bifurcation, sensitivity to initial conditions, the cobweb diagram, sample entropy and the 0-1 test.
A new deep steganographic technique for hiding several secret images in one cover Htiti, Mohamed; El Ouaazizi, Aziza; Akharraz, Ismail; Ahaitouf, Abdelaziz
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i3.pp2210-2219

Abstract

Deep learning has been integrated with image steganography to enhance steganographic security by automatically acquiring the ability to hide information. The issue with current models is that if the cover image is accessible, it is possible to expose the hidden information by simply calculating the differences between the cover image and the steganographic image. This paper introduces a novel image steganography model that utilizes convolutional neural network (CNN) to enhance the dissimulation and extraction capabilities. Specifically, we propose a model that hides two images in a single cover image. Before being hidden within the cover image, a random pixel image is generated and combined with the real secret image. Experimental results show that our proposed method is more effective and relevant.
Image encryption algorithm based on a new one-dimensional chaotic map’s generator Htiti, Mohamed; Akharraz, Ismail; Ahaitouf, Abdelaziz
Bulletin of Electrical Engineering and Informatics Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i4.9500

Abstract

Encryption plays a crucial role in protecting sensitive data, including communications, financial transactions, and personal information, from cyber threats. One significant area of encryption is image encryption, which ensures the privacy of visual content, such as in secure image transmission, cloud storage, and medical image processing. Recent advancements in image encryption leverage chaotic maps based on chaos theory, generating unpredictable patterns ideal for securing images. This paper presents a novel chaotic map generator that enhances the dynamics of existing chaotic maps. Based on this generator, we propose a new encryption scheme that operates on the entire input image, obscuring the relationship between the original and encrypted images while spreading pixel changes across the entire encrypted image in one step. The scheme also produces an encrypted image of a different size, making it more efficient and resilient to attacks. While some steps of the proposed system are symmetric, others are asymmetric, ensuring a higher level of security. Based on the obtained results, this approach significantly enhances both security and performance in image encryption.