Medical image encryption: a comprehensive review

ST Ahmed, DA Hammood, RF Chisab, A Al-Naji… - Computers, 2023 - mdpi.com
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …

The personal health applications of machine learning techniques in the internet of behaviors

Z Amiri, A Heidari, M Darbandi, Y Yazdani… - Sustainability, 2023 - mdpi.com
With the swift pace of the development of artificial intelligence (AI) in diverse spheres, the
medical and healthcare fields are utilizing machine learning (ML) methodologies in …

[HTML][HTML] Design and optimization of nonlinear component of block cipher: Applications to multimedia security

A Waheed, F Subhan, MM Suud, MM Alam… - Ain Shams Engineering …, 2024 - Elsevier
Nowadays, various image encryption schemes based on chaotic systems have been
developed, each of them has its own limitations and strength in terms of security and …

[HTML][HTML] LWED: Lightweight white-box encryption communication system for drones over CARX algorithm

Y Yang, H Dong, Z Li, S Xiao - Journal of King Saud University-Computer …, 2023 - Elsevier
The application field of drones is being broadened with the development of communication
and computer technology, but the communication link and data security of drones are facing …

Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps

PP Duong, HM Nguyen, BA Dao… - IEEE …, 2024 - ieeexplore.ieee.org
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …

[PDF][PDF] Malicious traffic compression and classification technique for secure internet of things

YR Lee, NE Park, SY Kim, IG Lee - Computers, Materials & …, 2023 - cdn.techscience.cn
With the introduction of 5G technology, the application of Internet of Things (IoT) devices is
expanding to various industrial fields. However, introducing a robust, lightweight, low-cost …

Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme.

SA Baowidan, A Alamer, M Hassan… - Symmetry …, 2024 - search.ebscohost.com
Data security is one of the biggest concerns in the modern world due to advancements in
technology, and cryptography ensures that the privacy, integrity, and authenticity of such …

A strong 4× 4 s-box using an enhanced tent map

PP Duong, TT Hoang, CK Pham - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Substitution boxes (S-Boxes) are essential nonlinear components in order to be resistant to
the cryptanalytic analysis of modern block ciphers. Given their significance, there is a wide …

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

S Pandey, B Bhushan - Wireless Networks, 2024 - Springer
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …

HAIL: a family of high-diffusion lightweight block ciphers for internet of things security

CT Deng, L Li, JY Feng, LY Yan - Physica Scripta, 2024 - iopscience.iop.org
The accelerated evolution of Internet of Things (IoT) technology has made it crucial to secure
information from resource-constrained devices. Therefore, a high-diffusion lightweight block …