Image encryption algorithms: A survey of design and evaluation metrics
Y Alghamdi, A Munir - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Ensuring confidentiality and privacy is critical when it comes to sharing images over
unsecured networks such as the internet. Since widely used and secure encryption …
unsecured networks such as the internet. Since widely used and secure encryption …
[HTML][HTML] An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal's matrix
AA Neamah - Journal of King Saud University-Computer and …, 2023 - Elsevier
The transmission of an excessive number of images between users via the Internet and
other communication media necessitates the use of effective techniques to protect the …
other communication media necessitates the use of effective techniques to protect the …
A physical memristor-based chaotic system and its application in colour image encryption scheme
P Das, S Mandal - Physica Scripta, 2023 - iopscience.iop.org
This work proposes a physical memristor (TaOx) based new 4D chaotic system with 3D multi-
scroll, no equilibrium point, spiking behaviour, coexistence bursting oscillation and …
scroll, no equilibrium point, spiking behaviour, coexistence bursting oscillation and …
Human activity recognition using cascaded dual attention cnn and bi-directional gru framework
Vision-based human activity recognition (HAR) has emerged as one of the essential
research areas in video analytics. Over the last decade, numerous advanced deep learning …
research areas in video analytics. Over the last decade, numerous advanced deep learning …
Image encryption based on 2DNA encoding and chaotic 2D logistic map
AH Alrubaie, MAA Khodher, AT Abdulameer - Journal of Engineering and …, 2023 - Springer
DNA has recently been investigated as a possible medium concerning ultra-compact
information storage and ultra-scale computation. The development of secure image …
information storage and ultra-scale computation. The development of secure image …
An image encryption algorithm based on improved Hilbert curve scrambling and dynamic DNA coding
S Geng, J Li, X Zhang, Y Wang - Entropy, 2023 - mdpi.com
As an effective method for image security protection, image encryption is widely used in data
hiding and content protection. This paper proposes an image encryption algorithm based on …
hiding and content protection. This paper proposes an image encryption algorithm based on …
Performance Enhancement of FSO communication system Under Rainy Weather Environment using a novel encryption technique
SA Abd El-Mottaleb, AG Mohamed, HY Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
Free Space Optics (FSO) has emerged as a viable solution to meet the growing demand for
high bandwidth, secure data transmission, and high speed. However, the FSO system is …
high bandwidth, secure data transmission, and high speed. However, the FSO system is …
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …
messages for transmission over the Internet, with the aim of addressing the current problems …
A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application
R Flores-Carapia, VM Silva-García… - Applied Sciences, 2023 - mdpi.com
Images with sensitive content require encryption for storage and transmission. Symmetric
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …
[PDF][PDF] Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi.
Image authentication techniques have recently received a lot of attention for protecting
images against unauthorized access. Due to the wide use of the Internet nowadays, the …
images against unauthorized access. Due to the wide use of the Internet nowadays, the …