A forensic framework to improve digital image evidence administration in IIoT✰

D Rani, NS Gill, P Gulia - Journal of Industrial Information Integration, 2024 - Elsevier
The extensive growth of Industrial Internet of Things (IIoT) has prompted cyber attackers to
commence a variety of attacks which need to be identified to maintain the security of …

MLCM: An efficient image encryption technique for IoT application based on multi-layer chaotic maps

K Al-Majdi, A Salman, NA Abbas… - … Journal of Nonlinear …, 2022 - ijnaa.semnan.ac.ir
The importance of image encryption has considerably increased especially after the
dramatic evolution of the internet of things (IOT) and due to the simplicity of capturing and …

Image Encryption using Chaotic maps: State of the art

L Gupta, P Jaiswal, I Lather, R Agarwal… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Due to the swift growth of the internet and the increasing flow of data across public networks,
data security is becoming more and more crucial. One potential resolution to this issue is …

Secure image encryption using chaotic, hybrid chaotic and block cipher approach

N Chaudhary, TB Shahi, A Neupane - Journal of Imaging, 2022 - mdpi.com
Secure image transmission is one of the most challenging problems in the age of
communication technology. Millions of people use and transfer images for either personal or …

Secured image storage and transmission technique suitable for IoT using Tangle and a novel image encryption technique

N Makhija - Multimedia Tools and Applications, 2023 - Springer
In the recent years, there has been tremendous growth in the use of IoT based applications.
It is making its footprint strong with day to day life uses as well as industrial uses. IoT has …

Image Encryption Based on Cyclic Chaos, PRNG and Arnold's Cat Map

D Das, C Pradhan - Proceedings of Data Analytics and Management …, 2023 - Springer
At present, globe of modern picture amid the data exchange is more critical. So nowadays,
security issues while data exchange have become the major concern. Consequently …

[PDF][PDF] Enhanced image encryption using two chaotic maps

FA Salman, KA Salman - Journal of ICT Research and …, 2020 - researchgate.net
Information security is an important aspect in various communication areas, multimedia
frameworks, medical imaging and militant communications. However, most of them …

A Survey of Internet of Things (IoT) Forensics Frameworks and Challenges

F Abdel-Fattah, S Fayyad, AM Heyari… - 2023 International …, 2023 - ieeexplore.ieee.org
The Internet of Things has led to the deployment of billions of interconnected devices in
critical infrastructures such as health, transportation, environmental control, and home …

Comparative study of image encryption using 2D chaotic map

KK Kabi, C Pradhan, BJ Saha… - … on Information Systems …, 2014 - ieeexplore.ieee.org
Securing digital image during transmission is very much important in the current era. For this
purpose, cryptographic techniques as well as chaotic maps can be applicable. In this paper …

Image encryption using hybrid chaotic map

HN Abdullah, HA Abdullah - 2017 International conference on …, 2017 - ieeexplore.ieee.org
Recently, great attention is paid to the use of chaotic maps in image encryption applications
due to their excellent randomness properties. In this paper, an efficient image encryption …