A comprehensive review on image encryption techniques
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …
authenticate digital images. This paper presents a comprehensive study of various image …
Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications
In this paper, we present a robust and secure watermarking approach using transform
domain techniques for tele-health applications. The patient report/identity is embedding into …
domain techniques for tele-health applications. The patient report/identity is embedding into …
A combination chaotic system and application in color image encryption
R Parvaz, M Zarebnia - Optics & Laser Technology, 2018 - Elsevier
In this paper, by using Logistic, Sine and Tent systems we define a combination chaotic
system. Some properties of the chaotic system are studied by using figures and numerical …
system. Some properties of the chaotic system are studied by using figures and numerical …
Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application
In this paper, a digital image encryption algorithm is proposed based on the generalized
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
HAIE: a hybrid adaptive image encryption algorithm using Chaos and DNA computing
S Mansoor, SA Parah - Multimedia Tools and Applications, 2023 - Springer
In this paper, a distinctive Hybrid Adaptive Image Encryption (HAIE) scheme is proposed that
utilizes some statistical parameters of the plain image like mean and variance to modify the …
utilizes some statistical parameters of the plain image like mean and variance to modify the …
A comprehensive analysis on image encryption and compression techniques with the assessment of performance evaluation metrics
N Mahendiran, C Deepa - SN Computer Science, 2021 - Springer
The explosive generation of data in the digital era directs to the requirements of effective
approaches to transmit and store the data. The necessities of security and limited resources …
approaches to transmit and store the data. The necessities of security and limited resources …
Color image encryption using minimax differential evolution-based 7D hyper-chaotic map
Hyperchaotic maps are generally used in the encryption to generate the secret keys. The
number of hyperchaotic maps has been implemented so far. These maps involve a large …
number of hyperchaotic maps has been implemented so far. These maps involve a large …
Chaotic based secure watermarking approach for medical images
In this paper, a chaotic based secure medical image watermarking approach is proposed.
The method is using non sub-sampled contourlet transform (NSCT), redundant discrete …
The method is using non sub-sampled contourlet transform (NSCT), redundant discrete …
Secret sharing-based personal health records management for the Internet of Health Things
The holistic concept of smart cities has been adopted to increase economic, environmental,
and social sustainability. For the sustainable health of a smart city inhabitant, there is a …
and social sustainability. For the sustainable health of a smart city inhabitant, there is a …
[PDF][PDF] A survey and analysis of the image encryption methods
OF Mohammad, MSM Rahim… - International Journal of …, 2017 - academia.edu
At the present time, the protection of multimedia data has become a very important process
which can be achieved by encryption. Basically, so many different techniques have been …
which can be achieved by encryption. Basically, so many different techniques have been …