Medical image encryption: a comprehensive review
ST Ahmed, DA Hammood, RF Chisab, A Al-Naji… - Computers, 2023 - mdpi.com
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …
imaging technology and methods for analyzing medical images advance, there will be a …
The personal health applications of machine learning techniques in the internet of behaviors
With the swift pace of the development of artificial intelligence (AI) in diverse spheres, the
medical and healthcare fields are utilizing machine learning (ML) methodologies in …
medical and healthcare fields are utilizing machine learning (ML) methodologies in …
[HTML][HTML] Design and optimization of nonlinear component of block cipher: Applications to multimedia security
Nowadays, various image encryption schemes based on chaotic systems have been
developed, each of them has its own limitations and strength in terms of security and …
developed, each of them has its own limitations and strength in terms of security and …
[HTML][HTML] LWED: Lightweight white-box encryption communication system for drones over CARX algorithm
Y Yang, H Dong, Z Li, S Xiao - Journal of King Saud University-Computer …, 2023 - Elsevier
The application field of drones is being broadened with the development of communication
and computer technology, but the communication link and data security of drones are facing …
and computer technology, but the communication link and data security of drones are facing …
Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …
[PDF][PDF] Malicious traffic compression and classification technique for secure internet of things
With the introduction of 5G technology, the application of Internet of Things (IoT) devices is
expanding to various industrial fields. However, introducing a robust, lightweight, low-cost …
expanding to various industrial fields. However, introducing a robust, lightweight, low-cost …
Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme.
SA Baowidan, A Alamer, M Hassan… - Symmetry …, 2024 - search.ebscohost.com
Data security is one of the biggest concerns in the modern world due to advancements in
technology, and cryptography ensures that the privacy, integrity, and authenticity of such …
technology, and cryptography ensures that the privacy, integrity, and authenticity of such …
A strong 4× 4 s-box using an enhanced tent map
Substitution boxes (S-Boxes) are essential nonlinear components in order to be resistant to
the cryptanalytic analysis of modern block ciphers. Given their significance, there is a wide …
the cryptanalytic analysis of modern block ciphers. Given their significance, there is a wide …
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …
HAIL: a family of high-diffusion lightweight block ciphers for internet of things security
CT Deng, L Li, JY Feng, LY Yan - Physica Scripta, 2024 - iopscience.iop.org
The accelerated evolution of Internet of Things (IoT) technology has made it crucial to secure
information from resource-constrained devices. Therefore, a high-diffusion lightweight block …
information from resource-constrained devices. Therefore, a high-diffusion lightweight block …