[HTML][HTML] Blockchain-supported online banking scheme

CH Tsai, DK Liou, HL Lee - Egyptian Informatics Journal, 2024 - Elsevier
Online banking not merely enables customers to make transactions within a short time and
access transactional information anywhere but also facilitates financial institutions to simplify …

Quantum image encryption protocol for secure communication in healthcare networks

S Prajapat, D Kumar, P Kumar - Cluster Computing, 2025 - Springer
Maintaining patient confidentiality and ensuring data integrity are critical aspects of
healthcare information security. In response to the growing need for enhanced security …

Enhancing image data security using the APFB model

K Barik, S Misra, LF Sanz, S Chockalingam - Connection Science, 2024 - Taylor & Francis
Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography
recreates a critical function in safeguarding information from potential risks and confirming …

An encryption algorithm for color images based on an improved dual-chaotic system combined with DNA encoding

R Li, T Liu, J Yin - Scientific Reports, 2024 - nature.com
This study improves the Logistic chaotic system and combines it with the hyperchaotic Chen
system to create a dual chaotic system. The algorithm encrypts images in three stages. In the …

An efficient image encryption algorithm using 3D-cyclic chebyshev map and elliptic curve

S Kanwal, S Inam, S Al-Otaibi, J Akbar, N Siddiqui… - Scientific Reports, 2024 - nature.com
With the development of internet technologies, it is now usual to communicate enormous
amounts of text and visual data over networks, which calls for stringent procedures to …

[HTML][HTML] Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network

S Inam, S Kanwal, A Anwar, NF Mirza… - Egyptian Informatics …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) links medical devices and wearable,
enhancing healthcare. To secure sensitive patient data over the IoMT, encryption is vital to …

Medical image encryption algorithm based on Fresnel zone formula, differential neural networks, and pixel-guided perturbation techniques

MJ Al-Muhammed - Computers and Electrical Engineering, 2024 - Elsevier
This paper proposes an image encryption technique that integrates deep pixel substitution,
data-dependent and chaotic pixel perturbation, and differential neural networks. The pixels …

A smart agriculture image protection scheme based on annealing algorithm and affine transformation is optimized for S-box generated by chaos

L Zhou, H Chen, X Zhou, Y Yuan, WN Zhu, M Zhou - Nonlinear Dynamics, 2024 - Springer
To strengthen image security in smart agriculture, this paper presents a Two-Dimensional
Super-Attractor Logistic Coupled Chaotic Model (2D-SALC). The model underwent rigorous …

Fibonacci Q-Matrix, Hyperchaos, and Galois Field (28) for Augmented Medical Image Encryption

D El-Damak, W Alexan, E Mamdouh, M El-Aasser… - IEEE …, 2024 - ieeexplore.ieee.org
This work introduces a novel image encryption algorithm specifically designed for the
protection of color medical images, particularly crucial in the era of cloud storage, where …

An Improved Dung Beetle Optimization Algorithm for High-Dimension Optimization and Its Engineering Applications

X Wang, H Kang, Y Shen, X Sun, Q Chen - Symmetry, 2024 - mdpi.com
One of the limitations of the dung beetle optimization (DBO) is its susceptibility to local
optima and its relatively low search accuracy. Several strategies have been utilized to …