Secured IIoT against trust deficit-A flexi cryptic approach
This research allows the secure surveillance approach for the Internet of Things (IoT)
methodology to be developed by integrating wireless signalling and image encryption …
methodology to be developed by integrating wireless signalling and image encryption …
[HTML][HTML] Dual-domain image encryption in unsecure medium—a secure communication perspective
H Mahalingam, T Veeramalai, AR Menon… - Mathematics, 2023 - mdpi.com
With the growing demand for digitalization, multimedia data transmission through wireless
networks has become more prominent. These multimedia data include text, images, audio …
networks has become more prominent. These multimedia data include text, images, audio …
Efficient and secure chaotic PRNG for color image encryption
MM Al-Mhadawi, EA Albahrani, SH Lafta - Microprocessors and …, 2023 - Elsevier
Random number generation is considered a major problem for any digital color image
cipher algorithm and secret communication protocol. Pseudo-random number generators …
cipher algorithm and secret communication protocol. Pseudo-random number generators …
Healthcare with datacare—a triangular DNA security
SA Banu, AI Al-Alawi, M Padmaa, PS Priya… - Multimedia Tools and …, 2024 - Springer
One of the fastest-growing industries in recent years has been e-Healthcare. Many
cyberattacks and threats against patient confidentiality exist in electronic health records …
cyberattacks and threats against patient confidentiality exist in electronic health records …
[HTML][HTML] Fast image encryption algorithm for logistics-sine-cosine mapping
P Wang, Y Wang, J Xiang, X Xiao - Sensors, 2022 - mdpi.com
Because images are vulnerable to external attacks in the process of network transmission
and traditional image encryption algorithms have limitations such as long encryption time …
and traditional image encryption algorithms have limitations such as long encryption time …
Image encryption-compression method via encryption based sparse decomposition
A Ghaffari - Multimedia Tools and Applications, 2024 - Springer
This paper proposes an image compression and encryption scheme based on sparse
decomposition and chaotic system. The proposed approach contains three steps. In the first …
decomposition and chaotic system. The proposed approach contains three steps. In the first …
Latin square and machine learning techniques combined algorithm for image encryption
S Patel, V Thanikaiselvan - Circuits, Systems, and Signal Processing, 2023 - Springer
Multimedia data is crucial in the military, medical, forensics, social, etc., to transmit a large
amount of data. Security of this sensitive information is the primary issue. This paper uses …
amount of data. Security of this sensitive information is the primary issue. This paper uses …
[HTML][HTML] A new chaotic-based RGB image encryption technique using a nonlinear rotational 16× 16 DNA playfair matrix
D Ibrahim, K Ahmed, M Abdallah, AEA Ali - Cryptography, 2022 - mdpi.com
Due to great interest in the secure storage and transmission of color images, the necessity
for an efficient and robust RGB image encryption technique has grown. RGB image …
for an efficient and robust RGB image encryption technique has grown. RGB image …
A new 2D-ASC chaotic system and its image encryption applications
J Peng, C Zhu, D Jiang - Modern Physics Letters B, 2023 - World Scientific
In this paper, a new 2D Arnold-sin-coupling (2D-ASC) hyperchaotic map is established and
a new image encryption algorithm based on bit-level operations and the ASC hyperchaotic …
a new image encryption algorithm based on bit-level operations and the ASC hyperchaotic …
ICFCM-MIE: Improved Cosine Fractional Chaotic Map based Medical Image Encryption
Advanced healthcare applications such as telemedicine, smart health, and e-health transmit
digital images over an open and insecure communication network. Hence, it becomes …
digital images over an open and insecure communication network. Hence, it becomes …