Image encryption algorithms: A survey of design and evaluation metrics

Y Alghamdi, A Munir - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Ensuring confidentiality and privacy is critical when it comes to sharing images over
unsecured networks such as the internet. Since widely used and secure encryption …

[HTML][HTML] An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal's matrix

AA Neamah - Journal of King Saud University-Computer and …, 2023 - Elsevier
The transmission of an excessive number of images between users via the Internet and
other communication media necessitates the use of effective techniques to protect the …

A physical memristor-based chaotic system and its application in colour image encryption scheme

P Das, S Mandal - Physica Scripta, 2023 - iopscience.iop.org
This work proposes a physical memristor (TaOx) based new 4D chaotic system with 3D multi-
scroll, no equilibrium point, spiking behaviour, coexistence bursting oscillation and …

Human activity recognition using cascaded dual attention cnn and bi-directional gru framework

H Ullah, A Munir - Journal of Imaging, 2023 - mdpi.com
Vision-based human activity recognition (HAR) has emerged as one of the essential
research areas in video analytics. Over the last decade, numerous advanced deep learning …

Image encryption based on 2DNA encoding and chaotic 2D logistic map

AH Alrubaie, MAA Khodher, AT Abdulameer - Journal of Engineering and …, 2023 - Springer
DNA has recently been investigated as a possible medium concerning ultra-compact
information storage and ultra-scale computation. The development of secure image …

An image encryption algorithm based on improved Hilbert curve scrambling and dynamic DNA coding

S Geng, J Li, X Zhang, Y Wang - Entropy, 2023 - mdpi.com
As an effective method for image security protection, image encryption is widely used in data
hiding and content protection. This paper proposes an image encryption algorithm based on …

Performance Enhancement of FSO communication system Under Rainy Weather Environment using a novel encryption technique

SA Abd El-Mottaleb, AG Mohamed, HY Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
Free Space Optics (FSO) has emerged as a viable solution to meet the growing demand for
high bandwidth, secure data transmission, and high speed. However, the FSO system is …

Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism

MA Al Sibahee, ZA Abduljabbar, C Luo, J Zhang… - Plos one, 2024 - journals.plos.org
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …

A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application

R Flores-Carapia, VM Silva-García… - Applied Sciences, 2023 - mdpi.com
Images with sensitive content require encryption for storage and transmission. Symmetric
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …

[PDF][PDF] Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi.

DS Khafaga, SM Alhammad, A Magdi… - … Systems Science & …, 2023 - cdn.techscience.cn
Image authentication techniques have recently received a lot of attention for protecting
images against unauthorized access. Due to the wide use of the Internet nowadays, the …