[HTML][HTML] A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

ZE Dawahdeh, SN Yaakob, RR bin Othman - Journal of King Saud …, 2018 - Elsevier
Image encryption is rapidly increased recently by the increasing use of the internet and
communication media. Sharing important images over unsecured channels is liable for …

[HTML][HTML] Securing medical information transmission between IoT devices: An innovative hybrid encryption scheme based on quantum walk, DNA encoding, and chaos

MU Rehman, A Shafique, AB Usman - Internet of Things, 2023 - Elsevier
The healthcare industry has undergone a transformation due to the widespread use of
advanced communication technologies and wireless sensor networks such as the Internet of …

[PDF][PDF] Dynamic key matrix of hill cipher using genetic algorithm

A Putera, U Siahaan, R Rahim - Int. J. Secur. Its Appl, 2016 - osf.io
Genetic algorithms can solve complex problems, including the problems of cryptography.
What problems often occur on the Hill Cipher is the waste of time to determine the numbers …

[PDF][PDF] A new hybrid text encryption approach over mobile ad hoc network

MA Almaiah, Z Dawahdeh, O Almomani… - Int. J. Electr. Comput …, 2020 - academia.edu
Data exchange has been rapidly increased recently by increasing the use of mobile
networks. Sharing information (text, image, audio and video) over unsecured mobile network …

An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography

M Benssalah, Y Rhaskali, K Drouiche - Multimedia Tools and Applications, 2021 - Springer
Nowadays, diagnosing patient diseases remotely is a routine and digital medical images
analysis as a part of Telecare Medical Information Systems (TMIS) play a fundamental role …

Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps

M Essaid, I Akharraz, A Saaidi - Journal of Information Security and …, 2019 - Elsevier
This article suggests a new image encryption algorithm based on a secure variant of Hill
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …

A new secure transmission scheme between senders and receivers using HVCHC without any loss

S Almutairi, M Aborokbah - EURASIP Journal on Wireless …, 2019 - Springer
This paper presents a novel secure medical image transmission scheme using hybrid visual
cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale …

Three-pass protocol concept in Hill Cipher encryption technique

APU Siahaan - Seminar Nasional Aplikasi Teknologi Informasi …, 2016 - journal.uii.ac.id
Encryption is imperative in the world of computers. Delivery of data requires a technique that
the data is free from attack. Hill Cipher is the popular cryptography method. There are so …

Hill cipher modification: A simplified approach

JR Paragas, AM Sison… - 2019 IEEE 11th …, 2019 - ieeexplore.ieee.org
Most people nowadays are using the internet as a means of communication to facilitate
exchanging sensitive data. Securing this data is vital considering almost all computers in the …

A triple hill cipher algorithm proposed to increase the security of encrypted binary dataand its implementation using FPGA

AAM Khalaf, MS Abd El-karim… - 2016 18th International …, 2016 - ieeexplore.ieee.org
Encrypted binary data security is an important task in the field of data communication
systems since many decades. In this paper, we study the security problem and present a …