[HTML][HTML] An optimized chaotic S-box for real-time image encryption scheme based on 4-dimensional memristive hyperchaotic map
M Vijayakumar, A Ahilan - Ain Shams Engineering Journal, 2024 - Elsevier
As digital products communicate over public networks, digital image security becomes
essential. Despite advancements in encryption technology, protecting data from secure …
essential. Despite advancements in encryption technology, protecting data from secure …
A novel multi-wing chaotic system with FPGA implementation and application in image encryption
H Cai, J Sun, Z Gao, H Zhang - Journal of Real-Time Image Processing, 2022 - Springer
In this paper, a two-wing chaotic system is transformed into a four-wing chaotic system and
an eight-wing chaotic system using fractal processing and the dynamic characteristics of …
an eight-wing chaotic system using fractal processing and the dynamic characteristics of …
Reconfigurable color medical image encryptor using hardware accelerated Chao (S)-box triplets
V Raj, S Janakiraman, R Amirtharajan - Journal of Real-Time Image …, 2023 - Springer
In telemedicine applications, the security of digitized medical images plays a vital role
globally. Field Programmable Gate Array (FPGA)-based implementations have many …
globally. Field Programmable Gate Array (FPGA)-based implementations have many …
Medical image encryption based on josephus traversing and hyperchaotic lorenz system
N Yang, S Zhang, M Bai, S Li - Journal of Shanghai Jiaotong University …, 2024 - Springer
This study proposes a new medical image encryption scheme based on Josephus
traversing and hyperchaotic Lorenz system. First, a chaotic sequence is generated through …
traversing and hyperchaotic Lorenz system. First, a chaotic sequence is generated through …
Medical image characteristic region recognition encryption algorithm based on intra and inter blocks scrambling and LSCC chaotic map
R Chen, F Zhang, L Teng, X Wang - Multimedia Tools and Applications, 2023 - Springer
In recent years, telemedicine has received widespread attention. It is very necessary to
encrypt medical images, especially the feature areas of images. Based on the chaotic model …
encrypt medical images, especially the feature areas of images. Based on the chaotic model …
FPGA for secured hardware & IP ownership
Reconfigurable nature of embedded FPGAs (EFPGA) are commonly used hardware for
system-on-chip design due to additional features of upgradability, and security with high …
system-on-chip design due to additional features of upgradability, and security with high …
Lightweight digital imaging and communications in medicine image encryption for IoT system
MA Hatem, BA Hameedi… - … Electronics and Control), 2023 - telkomnika.uad.ac.id
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such
as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging …
as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging …
A Modified KLEIN Encryption-based Knight Tour for Image Encryption
EO Oraby, RM Hamza - Journal of Applied Engineering and …, 2023 - yrpipku.com
The security considerations should be balanced with the specific use case and potential
risks associated with using lightweight encryption. The security offered by lighter encryption …
risks associated with using lightweight encryption. The security offered by lighter encryption …
Quaternion keyed Least Square Approximation for image encryption
D Kalaiarasan, A Ahilan - Journal of Intelligent & Fuzzy …, 2022 - content.iospress.com
Securing image data from prying hackers is crucial in safeguarding the secrecy of data. Over
the years, this was done by encrypting the image using an algorithm and a key, where the …
the years, this was done by encrypting the image using an algorithm and a key, where the …
A Harris Hawk Optimization with chaotic map based image encryption for multimedia application
D Kalaiarasan, A Ahilan… - Journal of Intelligent & …, 2023 - content.iospress.com
Image security plays a vital role in communication networks. Despite advancements in
encryption, securing protective image data remains a computationally challenging problem …
encryption, securing protective image data remains a computationally challenging problem …