Computational image encryption techniques: a comprehensive review

M Kaur, S Singh, M Kaur - Mathematical Problems in …, 2021 - Wiley Online Library
Images contain very sensitive and confidential information. Because images play a
significant role in many applications such as military communication, remote‐sensing, and …

Classification of the COVID-19 infected patients using DenseNet201 based deep transfer learning

A Jaiswal, N Gianchandani, D Singh… - Journal of …, 2021 - Taylor & Francis
Deep learning models are widely used in the automatic analysis of radiological images.
These techniques can train the weights of networks on large datasets as well as fine tuning …

Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text

S Shekhar, H Garg, R Agrawal, S Shivani… - Complex & Intelligent …, 2023 - Springer
The paper describes the usage of self-learning Hierarchical LSTM technique for classifying
hatred and trolling contents in social media code-mixed data. The Hierarchical LSTM-based …

Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption

X Chai, X Zhi, Z Gan, Y Zhang, Y Chen, J Fu - Signal Processing, 2021 - Elsevier
Image encryption is one of the important methods for preservation of confidentiality and
integrity of digital images. In this paper, a color image cryptosystem based on improved …

A systematic review of metaheuristic-based image encryption techniques

M Kaur, S Singh, M Kaur, A Singh, D Singh - Archives of computational …, 2021 - Springer
Image encryption protects the sensitive and confidential information of images. This
protection comes from the combination of secret keys, encryption, and decryption algorithms …

Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption

M Kaur, D Singh - Multidimensional Systems and Signal Processing, 2021 - Springer
Chaotic-based image encryption approaches have attracted great attention in the field of
information security. The properties of chaotic maps such as randomness and sensitivity …

An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption

A Gupta, D Singh, M Kaur - Journal of Ambient Intelligence and …, 2020 - Springer
Chaotic maps are extensively utilized in the field of image encryption to generate secret
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …

Fusion of medical images using deep belief networks

M Kaur, D Singh - Cluster Computing, 2020 - Springer
Image fusion plays a significant role in various computer vision applications. However,
designing an efficient image fusion technique is still a challenging task. In this paper, a novel …

Evolutionary-based image encryption using RNA codons truth table

M Mahmud, M Lee, JY Choi - Optics & Laser Technology, 2020 - Elsevier
Symmetric image cryptography is a mechanism in which image pixels are encrypted into
some meaningless format called cipher image. Only authorized users have access to the …

A new image encryption scheme based on fractional-order hyperchaotic system and multiple image fusion

X Gao, J Yu, S Banerjee, H Yan, J Mou - Scientific Reports, 2021 - nature.com
A multi-image encryption scheme based on the fractional-order hyperchaotic system is
designed in this paper. The chaotic characteristics of this system are analyzed by the phase …