Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions

AH Abdi, L Audah, A Salh, MA Alhartomi… - IEEE …, 2024 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …

ECC based novel color image encryption methodology using primitive polynomial

PL Sharma, S Gupta, A Nayyar, M Harish… - Multimedia Tools and …, 2024 - Springer
With the increasing use of digital images, there is a growing need for secure and efficient
image encryption algorithms to ensure their confidentiality during transmission. In this paper …

[PDF][PDF] Theoretical Background of Cryptography

RM Al-Amri, DN Hamood, AK Farhan - Mesopotamian Journal of …, 2023 - iasj.net
Cryptography is the practice of secure communication and the study of secure
communication techniques. The theoretical foundations of cryptography include concepts …

An image autonomous selection encryption algorithm based on the delay exponential logistic chaotic model

W Xu, L Liu - Nonlinear Dynamics, 2024 - Springer
In recent decades, many excellent holistic image encryption schemes have been proposed.
However, considering the practical application environment, only specific content in the …

Design and implementation of real-time image acquisition chip based on triple-hybrid encryption system

J Li, Y Luo, F Wang, W Gao - Electronics, 2022 - mdpi.com
With the improved hardware storage capabilities and the rapid development of artificial
intelligence image recognition technology, information is becoming image-oriented …

Optimized 3-D Chaotic Map for Compressed Image Encryption for Secure Communication

A Tiwari, P Diwan, TD Diwan - 2024 - researchsquare.com
In today's digital world, there is a significant increase in data transfer online especially in
multimedia form. This online transmission faces many cyber threats such as denial-of …

Securing Image using Triple Data Encryption Standard

MG Rao, D Cenitta, RV Arjunan… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
This study explores the efficacy of securing images through the implementation of the Triple
Data Encryption Standard (TDES). TDES, a symmetric-key block cipher, is examined for its …

RAINBOW: Resilient Asymmetric Imaging Non-linear Bit-level Ordering with Hyperchaotic Operation for Color image Encryption

W Zhang - Transactions on Computer Science and Intelligent …, 2024 - wepub.org
Hyperchaotic encryption, known for its high level of unpredictability and complexity, is widely
used in the field of image encryption. However, current hyperchaotic image encryption tech …

[PDF][PDF] IoMT Preserving Patients' Privacy

Y Elkhawass - 2023 - researchgate.net
The continuous advancement in technology has resulted in the Internet of Things (IoT)
becoming more powerful in collecting data and simplifying real-life applications, particularly …

Görüntü Şifrelemede Kullanılan Kaotik Haritaların Incelenmesi ve Hibrit bir Yöntem Önerisi

D Güvenoğlu - 2023 - search.proquest.com
Günümüz teknolojileri göz önüne alındığında günlük yaşantımızda en çok paylaşımda
bulunulan verilerin multimedya verileri olduğu görülmektedir. Ağ üzerinden multimedya …