Multimedia security using encryption: A survey

KM Hosny, MA Zaki, NA Lashin, MM Fouda… - IEEE …, 2023 - ieeexplore.ieee.org
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …

Medical video encryption using novel 2D Cosine-Sine map and dynamic DNA coding

D Dhingra, M Dua - Medical & Biological Engineering & Computing, 2024 - Springer
Modern healthcare systems contain a large amount of sensitive information related to a
patient in textual and visual form. Surgical videos and diagnosis data such as ultrasound …

Extended-Chacha20 Stream Cipher with Enhanced Quarter Round Function

VR Kebande - IEEE Access, 2023 - ieeexplore.ieee.org
Chacha20 is a widely used stream cipher known for using permutation functions to enhance
resistance against cryptanalysis. Although the existing literature highlights its strengths, it is …

A chaos-based word-wise stream cipher using keyed strong S-Box

A Kadeer, Y Tuersun, H Liu - Computers and Electrical Engineering, 2025 - Elsevier
Stream ciphers are crucial in the realm of information security. However, many existing
stream ciphers suffer from several vulnerabilities, including insufficient security levels and …

Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map

A Al-Daraiseh, Y Sanjalawe, S Al-E'mari… - Journal of Sensor and …, 2023 - mdpi.com
In recent years, there has been an increasing interest in employing chaotic-based random
number generators for cryptographic purposes. However, many of these generators produce …

A novel Cosine-Cosine chaotic map-based video encryption scheme

S Kumari, M Dua, S Dua, D Dhingra - Journal of Engineering and Applied …, 2024 - Springer
The surge in online activities has led to the increasing popularity of sharing video data
across diverse applications, including online education tutorials, social networking, video …

[HTML][HTML] Symmetry Analysis in Construction Two Dynamic Lightweight S-Boxes Based on the 2D Tinkerbell Map and the 2D Duffing Map

AT Khudhair, AT Maolood, EK Gbashi - Symmetry, 2024 - mdpi.com
The lack of an S-Box in some lightweight cryptography algorithms, like Speck and Tiny
Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption …

Even symmetric chaotic and skewed maps as a technique in video encryption

BM El-den, WA Raslan, AA Abdullah - EURASIP Journal on Advances in …, 2023 - Springer
The massive growth and use of digital multimedia through computer networks, including
video and images, have increased the demand for protecting this digital data. To secure …

Signal multiple encodings by using autoencoder deep learning

AS Anaz, MY Al-Ridha, RRO Al-Nima - Bulletin of Electrical Engineering …, 2023 - beei.org
Encryption is a substantial phase in information security. It permits only approved persons to
get private information. This study suggests a signal multi-encryptions system (SMES) …

A Lightweight Image Encryption Algorithm Based on Secure Key Generation

EK Gbashi, H Alaskar, AJ Hussain - IEEE Access, 2024 - ieeexplore.ieee.org
Data confidentiality and security are important issues due to the sensitivity of the data and its
relationship with users' privacy. Sensitive data includes images and texts that can be …