Medical image encryption: a comprehensive review

ST Ahmed, DA Hammood, RF Chisab, A Al-Naji… - Computers, 2023 - mdpi.com
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …

Grid-scroll memristive chaotic system with application to image encryption

Q Lai, Z Chen - Chaos, Solitons & Fractals, 2023 - Elsevier
The construction of multi-scroll chaotic systems has been a hot research topic in recent
years. In this paper, a four-dimensional multi-scroll chaotic system is established on the …

[HTML][HTML] ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption

D Jiang, N Tsafack, W Boulila, J Ahmad… - Expert Systems with …, 2024 - Elsevier
Recent advances in intelligent wearable devices have brought tremendous chances for the
development of healthcare monitoring system. However, the data collected by various …

Medical image encryption based on Josephus scrambling and dynamic cross-diffusion for patient privacy security

Z Zhang, J Tang, F Zhang, T Huang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, smart healthcare mode has been gradually maturing with the evolution of
Internet cloud computing technology. However, due to the open and shared features of the …

An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption

D Ding, W Wang, Z Yang, Y Hu, J Wang, M Wang… - Chaos, Solitons & …, 2023 - Elsevier
Abstract One-dimensional (1D) chaotic maps have many shortcomings, including simple
structures, uncomplicated chaotic behaviors, and narrow chaotic ranges. Multi-dimensional …

Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption

G Long, X Chai, Z Gan, D Jiang, X He, M Sun - Chaos, Solitons & Fractals, 2023 - Elsevier
As a result of their prominent initial value sensitivity, pseudo-randomness, and
unpredictability nature, chaotic maps are widely used in multimedia security. However, the …

Multimedia security using encryption: A survey

KM Hosny, MA Zaki, NA Lashin, MM Fouda… - IEEE …, 2023 - ieeexplore.ieee.org
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …

Image encryption using fission diffusion process and a new hyperchaotic map

Q Lai, H Hua, XW Zhao, U Erkan, A Toktas - Chaos, Solitons & Fractals, 2023 - Elsevier
This paper devises an effective image encryption algorithm that exploits a novel
hyperchaotic map and is applicable to a variety of image encryption scenarios. The newly …

A MapReduce based approach for secure batch satellite image encryption

MAS Al-Khasawneh, M Faheem, EA Aldhahri… - IEEE …, 2023 - ieeexplore.ieee.org
The overarching goal of this research was to examine the state of satellite imagery security
in relation to its deteriorating form due to rising demand. The most common approaches to …

Image encryption algorithm combining chaotic image encryption and convolutional neural network

L Feng, J Du, C Fu, W Song - Electronics, 2023 - mdpi.com
With the rapid development of information technology, the security of images has emerged
as a significant area of research. This study presents an algorithm that integrates chaotic …