A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications

S Thakur, AK Singh, SP Ghrera, M Elhoseny - Multimedia tools and …, 2019 - Springer
In this paper, we present a robust and secure watermarking approach using transform
domain techniques for tele-health applications. The patient report/identity is embedding into …

A combination chaotic system and application in color image encryption

R Parvaz, M Zarebnia - Optics & Laser Technology, 2018 - Elsevier
In this paper, by using Logistic, Sine and Tent systems we define a combination chaotic
system. Some properties of the chaotic system are studied by using figures and numerical …

Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application

P Ayubi, S Setayeshi, AM Rahmani - Journal of Information Security and …, 2020 - Elsevier
In this paper, a digital image encryption algorithm is proposed based on the generalized
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …

HAIE: a hybrid adaptive image encryption algorithm using Chaos and DNA computing

S Mansoor, SA Parah - Multimedia Tools and Applications, 2023 - Springer
In this paper, a distinctive Hybrid Adaptive Image Encryption (HAIE) scheme is proposed that
utilizes some statistical parameters of the plain image like mean and variance to modify the …

A comprehensive analysis on image encryption and compression techniques with the assessment of performance evaluation metrics

N Mahendiran, C Deepa - SN Computer Science, 2021 - Springer
The explosive generation of data in the digital era directs to the requirements of effective
approaches to transmit and store the data. The necessities of security and limited resources …

Color image encryption using minimax differential evolution-based 7D hyper-chaotic map

M Kaur, D Singh, V Kumar - Applied Physics B, 2020 - Springer
Hyperchaotic maps are generally used in the encryption to generate the secret keys. The
number of hyperchaotic maps has been implemented so far. These maps involve a large …

Chaotic based secure watermarking approach for medical images

S Thakur, AK Singh, SP Ghrera, A Mohan - Multimedia Tools and …, 2020 - Springer
In this paper, a chaotic based secure medical image watermarking approach is proposed.
The method is using non sub-sampled contourlet transform (NSCT), redundant discrete …

Secret sharing-based personal health records management for the Internet of Health Things

P Sarosh, SA Parah, GM Bhat, AA Heidari… - Sustainable Cities and …, 2021 - Elsevier
The holistic concept of smart cities has been adopted to increase economic, environmental,
and social sustainability. For the sustainable health of a smart city inhabitant, there is a …

[PDF][PDF] A survey and analysis of the image encryption methods

OF Mohammad, MSM Rahim… - International Journal of …, 2017 - academia.edu
At the present time, the protection of multimedia data has become a very important process
which can be achieved by encryption. Basically, so many different techniques have been …