Geo-information security technology: progress and prospects
ZHU Changqing, REN Na… - Acta Geodaetica et …, 2022 - xb.chinasmp.com
With the in-depth utilization of geographic information, the conflicts in geographic
information become severe between the requirements of high-precision wide-security-range …
information become severe between the requirements of high-precision wide-security-range …
[HTML][HTML] A novel content-selected image encryption algorithm based on the LS chaotic model
J Wang, L Liu, M Xu, X Li - Journal of King Saud University-Computer and …, 2022 - Elsevier
Many holistic image encryption schemes have been proposed in recent decades that
achieve a certain security level. However, considering the actual application environment …
achieve a certain security level. However, considering the actual application environment …
Medical image encryption based on improved ElGamal encryption technique
DS Laiphrakpam, MS Khumanthem - Optik, 2017 - Elsevier
Elliptic curve analogue ElGamal encryption scheme requires encoding of the plain message
onto elliptic curve coordinate using Koblitz encoding technique before encryption operation …
onto elliptic curve coordinate using Koblitz encoding technique before encryption operation …
Development of modified AES algorithm for data security
P Kumar, SB Rana - Optik, 2016 - Elsevier
Cryptography is a process by which information or messages can be sent from one user to
another user which provides several security services such as confidentiality, data integrity …
another user which provides several security services such as confidentiality, data integrity …
A literature review on image encryption techniques
S Geetha, P Punithavathi, AM Infanteena… - International Journal of …, 2018 - igi-global.com
Encryption is one of the techniques that ensure the security of images used in various
domains like military intelligence, secure medical imaging services, intranet and internet …
domains like military intelligence, secure medical imaging services, intranet and internet …
One round cipher algorithm for multimedia IoT devices
With the exponential growth in Internet-of-Things (IoT) devices, security and privacy issues
have emerged as critical challenges that can potentially compromise their successful …
have emerged as critical challenges that can potentially compromise their successful …
An encryption scheme for securing multiple medical images
With the rise in medical imaging tools and telemedicine technology, the distance barriers in
providing health care have been reduced by communicating patients data over the internet …
providing health care have been reduced by communicating patients data over the internet …
A fast multiple-image encryption algorithm based on hybrid chaotic systems for gray scale images
M Zarebnia, H Pakmanesh, R Parvaz - Optik, 2019 - Elsevier
This paper proposes a fast and efficient multiple-image encryption based on chaotic system.
The combination chaotic system is used to produce pseudorandom sequences to replace …
The combination chaotic system is used to produce pseudorandom sequences to replace …
SPRING: a novel parallel chaos-based image encryption scheme
Due to the increasing demand on secure image transmission, image encryption has
emerged as an active research field in recent years. Many of the proposed image encryption …
emerged as an active research field in recent years. Many of the proposed image encryption …
A blockchain-based security system with light cryptography for user authentication security
Abstract Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new
services, including smart cities, agriculture, energy, technology, healthcare, and other …
services, including smart cities, agriculture, energy, technology, healthcare, and other …