Hadjer 's repositories
Chaotic-map-based-Image-Encryption
Implementation of 2 chaotic map encryption schemes in MATLAB.
Chaotic-GSA-for-Engineering-Design-Problems
All nature-inspired algorithms involve two processes namely exploration and exploitation. For getting optimal performance, there should be a proper balance between these processes. Further, the majority of the optimization algorithms suffer from local minima entrapment problem and slow convergence speed. To alleviate these problems, researchers are
imbDRLAppendix
The appendix for the paper on imbDRL
LogisticMap_LFSR_ImageEncryptionDecryption
Single image encryption (and decryption) using logistic map equation and linear feedback shift.
rl-medical
Communicative Multiagent Deep Reinforcement Learning for Anatomical Landmark Detection using PyTorch.
AccessSecuritySystem
An Access Security System composing of facial recognition and fingerprint sensing
Adversarial-Policy-Gradient-Augmentation
Adversarial Policy Gradient for Medical Deep Learning Image Augmentation
An-image-encryption-scheme-based-on-Lorenz-Hyperchaotic-System-and-RSA-algorithm
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the keystream is produced iteratively. In order to change the position and gray value of the pixel, the image data are hidden by additive mode diffusion. Secondly, the diffusion image matrix is reshaped into a one-dimensional image matrix, which is confused without repetition to hide the image data again. Then, the finite field diffusion algorithm is executed to realize the third hiding of the image information. In order to diffuse the pixel information into the entire cipher image, the additive mode diffusion algorithm needs to be looped twice. Finally, the cipher image can be obtained. The experimental results prove that the image encryption scheme proposed in this research is effective, and has strong anti-attack and key sensitivity. Moreover, the security of this encryption scheme relies on the RSA algorithm, which has high security.
Block-wise-Scrambled-Image-Recognition
Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)
chaotic-maps-analysis
A Streamlit application for visualizing the behavior of discrete chaotic maps.
ChaoticImageEncryption
An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding.
Digital-image-watermarking-using-DWT-and-chaotic-maps
Discrete wavelet transform based image watermarking approach along with chaotic map based encryption of watermarks
FingerprintPresenceMarker
Fingerprint Presence Marker
Image-Encryption
An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN
image_encryption
Encrypt and decrypt images using chaotic maps: logistic, tent and sine maps (1-dimensional), henon and standard maps (2-dimensional). Additionally: separate RGB channels of an image, test separated channels. Put salt and pepper noise in plain image. Plot histogram and correlation plots for all these.
Image_encryption_using_MATLAB
A 3rd Year Mini Project which is Image Encryption using MATLAB
imbDRL
Imbalanced Classification with Deep Reinforcement Learning
logistic-map
Des programmes codés en Python pour modéliser l'application logistique, son diagramme de bifurcation et les différentes fractales qui lui sont associées (l'ensemble de Mandelbrot et les ensembles de Julia).
Logistic_map
This Matlab code is used for creating logistic map values.
MajProj_ALightweightMedicalImageEncryptionSchemeUsingChaoticMapsAndImageScrambling_SujithaSudevan
This repository contains the code implemented for the project "A Lightweight Medical Image Encryption Scheme Using Chaotic Maps and Image Scrambling
PRNGs
Pseudo-Random Number Generator algorithms used for the final essay of the elective course "Reti e sistemi complessi: fenomeni fisici e interazioni sociali".
pyfingerprint
Python library for ZhianTec fingerprint sensors (e.g. ZFM-20, ZFM-60)
randomness_testsuite
This is a Python implementation of NIST's A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
reservoir-computing-lyapunov-exponents
Using machine learning to replicate chaotic attractors and calculate Lyapunov exponents from data. Chaos 27, 121102 (2017); https://doi.org/10.1063/1.5010300
Reversible-Data-Hiding-in-Encrypted-Image
A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"
Some-traditional-image-encryption
Including Arnold Scrambling,Chaos Scrambling,Joseph Scrambling,Knight-Tour Scrambling