Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security

AS Almasoud, B Alabduallah, H Alqahtani, SS Aljameel… - Heliyon, 2024 - cell.com
Image encryption involves applying cryptographic approaches to convert the content of an
image into an illegible or encrypted format, reassuring that illegal users cannot simply …

A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application

R Flores-Carapia, VM Silva-García… - Applied Sciences, 2023 - mdpi.com
Images with sensitive content require encryption for storage and transmission. Symmetric
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …

[HTML][HTML] Blockchain with optimal deep learning assisted secure data sharing and classification on future healthcare systems

AA Alanazi, FK Karim, SA Ghorashi, G Amoudi… - Alexandria Engineering …, 2024 - Elsevier
In the future of healthcare, Blockchain (BC) technology holds immense potential for
improving the security and privacy of data. By allowing the secure and immutable storage of …

A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy

VM Silva-García, R Flores-Carapia… - Entropy, 2024 - mdpi.com
Today, safeguarding sensitive content through encryption is crucial. This work presents a
hybrid cryptosystem for images that employs both asymmetric and symmetric encryption …

Seagull Optimization Algorithm with Share Creation with an Image Encryption Scheme for Secure Vehicular Ad Hoc Networks

R Mohan, G Prabakaran… - Engineering, Technology & …, 2024 - etasr.com
Abstract Α Vehicular Ad hoc Network (VANET) allows transmission, amid moving or
stationary vehicles via wireless technology. Amongst several problems, safe transmission is …

Survey Study Image Cryptography System

FR Rahman, K Baheeja, MA Salih - BIO Web of Conferences, 2024 - bio-conferences.org
Encryption is vital for data security, converting information into an unreadable format to
ensure privacy in online communication and sensitive sectors. Advanced encryption …