Skip to main content

You're using an out-of-date version of Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.

    • by 
    •    0 comments
    •    1 participant
    •    
This book is a product of multiple authorship. In so being, it acknowledges the complexity that characterizes leadership in the new millennium. It is no longer sufficient to consider leadership as an individual pursuit. This notion... more
  • Download
    • by  and +1
    •   20  
      Leadership, Complexity Theory, Dialogue, Authenticity
The basic presumptions of the sciences, as we have known them, are undergoing transformational changes. The situation today is similar to that which existed in the 17th century. At that time the premises of science presented by Isaac... more
  • Download
    • by 
    •   19  
      Leadership, Human Values, Complexity Theory, Personal Relationships
New science, chaos and complexity theory challenges all leaders to rethink their most fundamental perspectives. It encourages new forms of leadership - where leaders should allow for multiple goals, embrace the concept of multiple effects... more
  • Download
    • by 
    •   14  
      Complex Systems Science, Leadership, Complexity Theory, Complex Systems
    • by 
    •   5  
      Chaos Theory, Video Compression, Digital Video Watermarking, Robust watermarking
    • by 
    •   3  
      Chaos Theory, Optimization techniques, Particle Swarm Optimization PSO)
    • by 
    •   3  
      Security, Chaos Theory, Image Steganography
    • by 
    •   3  
      Chaos Theory, Digital Watermarking, Tamper Detection
    • by 
    •   4  
      Chaos Theory, Image Forgery Detection, Cellular Automata, Contourlet Transform
    • by 
    •   3  
      Chaos Theory, Image Steganography, Transform Domain
    • by 
    •   3  
      Chaos Theory, Image Steganography, Integer Wavelet Transform (IWT
    • by 
    •   2  
      Chaos Theory, Image Scrambling
    • by 
    •   2  
      Chaos Theory, Image Encryption
    • by 
    •   8  
      Civil Engineering, Ocean Engineering, Time Series, Chaos Theory
In recent years, cryptologists have been delving into chaos theory to design more secure cryptographic primitives. However, many existing chaos-based algorithms are slow due to floating point operations. They are mostly sequential in... more
  • Download
    • by 
    •   6  
      Chaos Theory, Chaotic cryptography, Hash Functions, Chaotic Map
True random number generators are used in high security applications such as cryptography where non-determinism is required. However, they are slower than their pseudorandom counterparts because they need to extract entropy from physical... more
  • Download
    • by 
    •   5  
      Chaos Theory, Chaotic cryptography, Chaotic Map, Chaotic Cryptology
Chaotic maps are used in the design of hash functions due to their characteristics that are analogous to cryptographic requirements. However, these maps are commonly implemented using floating point representation which has high... more
  • Download
    • by 
    •   6  
      Chaos Theory, Chaotic cryptography, Hash Functions, Chaotic Map
Image encryption protects visual information by transforming images into an incomprehensible form. Chaotic systems are used to design image ciphers due to properties such as ergodicity and initial condition sensitivity. A chaos-based... more
  • Download
    • by 
    •   4  
      Chaos Theory, Chaotic cryptography, Chaotic Map, Chaos-based cryptography
Despite sharing many similar properties with cryptography, digitizing chaotic maps for the purpose of developing chaos-based cryptosystems leads to dynamical degradation, causing many security issues. This paper introduces a hybrid... more
  • Download
    • by 
    •   4  
      Chaos Theory, Chaotic cryptography, Chaotic Map, Chaos-based cryptography
Stream ciphers require the use of initialization vectors (IVs) to ensure that the same secret key produces different keystreams. It also synchronizes communication between two parties. However, there are many cryptanalytic attacks that... more
  • Download
    • by 
    •   4  
      Chaos Theory, Chaotic cryptography, Chaotic Map, Chaos-based cryptography