Image encryption techniques: A comprehensive review
H Kolivand, SF Hamood… - Multimedia Tools …, 2024 - researchonline.ljmu.ac.uk
This paper presents an exhaustive review of research within the field of image encryption
techniques. It commences with a general introduction to image encryption, providing an …
techniques. It commences with a general introduction to image encryption, providing an …
Some basic cryptographic requirements for chaos-based cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been
published. However, many of the proposed schemes fail to explain or do not possess a …
published. However, many of the proposed schemes fail to explain or do not possess a …
[HTML][HTML] Cosine-transform-based chaotic system for image encryption
Chaos is known as a natural candidate for cryptography applications owing to its properties
such as unpredictability and initial state sensitivity. However, certain chaos-based …
such as unpredictability and initial state sensitivity. However, certain chaos-based …
Image encryption using 2D Logistic-adjusted-Sine map
With complex properties of ergodicity, unpredictability and sensitivity to initial states, chaotic
systems are widely used in cryptography. This paper proposes a two-dimensional Logistic …
systems are widely used in cryptography. This paper proposes a two-dimensional Logistic …
A new chaotic map with dynamic analysis and encryption application in internet of health things
In this paper, we report an effective cryptosystem aimed at securing the transmission of
medical images in an Internet of Healthcare Things (IoHT) environment. This contribution …
medical images in an Internet of Healthcare Things (IoHT) environment. This contribution …
[图书][B] Applied cryptography: protocols, algorithms, and source code in C
B Schneier - 2007 - books.google.com
About The Book: This new edition of the cryptography classic provides you with a
comprehensive survey of modern cryptography. The book details how programmers and …
comprehensive survey of modern cryptography. The book details how programmers and …
Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption
In this contribution, the problem of multistability control in a simple model of 3D HNNs as
well as its application to biomedical image encryption is addressed. The space …
well as its application to biomedical image encryption is addressed. The space …
Symmetric ciphers based on two-dimensional chaotic maps
J Fridrich - International Journal of Bifurcation and chaos, 1998 - World Scientific
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on
a torus or on a square to create new symmetric block encryption schemes. A chaotic map is …
a torus or on a square to create new symmetric block encryption schemes. A chaotic map is …
A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box
In modern technological era image encryption has become an attractive and interesting field
for researchers. They work for improving the security of image data from unauthorized …
for researchers. They work for improving the security of image data from unauthorized …
A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map
Chaos-based encryption schemes have attracted many researchers around the world in the
digital image security domain. Digital images can be secured using existing chaotic maps …
digital image security domain. Digital images can be secured using existing chaotic maps …