Multimedia security using encryption: A survey
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …
of multimedia is highly important. Encryption is vital in modern digital communication …
Medical video encryption using novel 2D Cosine-Sine map and dynamic DNA coding
D Dhingra, M Dua - Medical & Biological Engineering & Computing, 2024 - Springer
Modern healthcare systems contain a large amount of sensitive information related to a
patient in textual and visual form. Surgical videos and diagnosis data such as ultrasound …
patient in textual and visual form. Surgical videos and diagnosis data such as ultrasound …
Extended-Chacha20 Stream Cipher with Enhanced Quarter Round Function
VR Kebande - IEEE Access, 2023 - ieeexplore.ieee.org
Chacha20 is a widely used stream cipher known for using permutation functions to enhance
resistance against cryptanalysis. Although the existing literature highlights its strengths, it is …
resistance against cryptanalysis. Although the existing literature highlights its strengths, it is …
A chaos-based word-wise stream cipher using keyed strong S-Box
A Kadeer, Y Tuersun, H Liu - Computers and Electrical Engineering, 2025 - Elsevier
Stream ciphers are crucial in the realm of information security. However, many existing
stream ciphers suffer from several vulnerabilities, including insufficient security levels and …
stream ciphers suffer from several vulnerabilities, including insufficient security levels and …
Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map
In recent years, there has been an increasing interest in employing chaotic-based random
number generators for cryptographic purposes. However, many of these generators produce …
number generators for cryptographic purposes. However, many of these generators produce …
A novel Cosine-Cosine chaotic map-based video encryption scheme
S Kumari, M Dua, S Dua, D Dhingra - Journal of Engineering and Applied …, 2024 - Springer
The surge in online activities has led to the increasing popularity of sharing video data
across diverse applications, including online education tutorials, social networking, video …
across diverse applications, including online education tutorials, social networking, video …
[HTML][HTML] Symmetry Analysis in Construction Two Dynamic Lightweight S-Boxes Based on the 2D Tinkerbell Map and the 2D Duffing Map
AT Khudhair, AT Maolood, EK Gbashi - Symmetry, 2024 - mdpi.com
The lack of an S-Box in some lightweight cryptography algorithms, like Speck and Tiny
Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption …
Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption …
Even symmetric chaotic and skewed maps as a technique in video encryption
The massive growth and use of digital multimedia through computer networks, including
video and images, have increased the demand for protecting this digital data. To secure …
video and images, have increased the demand for protecting this digital data. To secure …
Signal multiple encodings by using autoencoder deep learning
Encryption is a substantial phase in information security. It permits only approved persons to
get private information. This study suggests a signal multi-encryptions system (SMES) …
get private information. This study suggests a signal multi-encryptions system (SMES) …
A Lightweight Image Encryption Algorithm Based on Secure Key Generation
Data confidentiality and security are important issues due to the sensitivity of the data and its
relationship with users' privacy. Sensitive data includes images and texts that can be …
relationship with users' privacy. Sensitive data includes images and texts that can be …