Image encryption techniques: A comprehensive review

H Kolivand, SF Hamood… - Multimedia Tools …, 2024 - researchonline.ljmu.ac.uk
This paper presents an exhaustive review of research within the field of image encryption
techniques. It commences with a general introduction to image encryption, providing an …

Some basic cryptographic requirements for chaos-based cryptosystems

G Alvarez, S Li - International journal of bifurcation and chaos, 2006 - World Scientific
In recent years, a large amount of work on chaos-based cryptosystems have been
published. However, many of the proposed schemes fail to explain or do not possess a …

[HTML][HTML] Cosine-transform-based chaotic system for image encryption

Z Hua, Y Zhou, H Huang - Information Sciences, 2019 - Elsevier
Chaos is known as a natural candidate for cryptography applications owing to its properties
such as unpredictability and initial state sensitivity. However, certain chaos-based …

Image encryption using 2D Logistic-adjusted-Sine map

Z Hua, Y Zhou - Information Sciences, 2016 - Elsevier
With complex properties of ergodicity, unpredictability and sensitivity to initial states, chaotic
systems are widely used in cryptography. This paper proposes a two-dimensional Logistic …

A new chaotic map with dynamic analysis and encryption application in internet of health things

N Tsafack, S Sankar, B Abd-El-Atty, J Kengne… - IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we report an effective cryptosystem aimed at securing the transmission of
medical images in an Internet of Healthcare Things (IoHT) environment. This contribution …

[图书][B] Applied cryptography: protocols, algorithms, and source code in C

B Schneier - 2007 - books.google.com
About The Book: This new edition of the cryptography classic provides you with a
comprehensive survey of modern cryptography. The book details how programmers and …

Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption

ZT Njitacke, SD Isaac, T Nestor, J Kengne - Neural Computing and …, 2021 - Springer
In this contribution, the problem of multistability control in a simple model of 3D HNNs as
well as its application to biomedical image encryption is addressed. The space …

Symmetric ciphers based on two-dimensional chaotic maps

J Fridrich - International Journal of Bifurcation and chaos, 1998 - World Scientific
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on
a torus or on a square to create new symmetric block encryption schemes. A chaotic map is …

A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box

TS Ali, R Ali - Multimedia Tools and Applications, 2022 - Springer
In modern technological era image encryption has become an attractive and interesting field
for researchers. They work for improving the security of image data from unauthorized …

A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map

F Masood, J Ahmad, SA Shah, SS Jamal, I Hussain - Entropy, 2020 - mdpi.com
Chaos-based encryption schemes have attracted many researchers around the world in the
digital image security domain. Digital images can be secured using existing chaotic maps …