An overview of encryption algorithms in color images
Nowadays, security in data transfer is of special importance. Images are of the most
attractive kinds of data in the encryption domain. Color images are more attractive than the …
attractive kinds of data in the encryption domain. Color images are more attractive than the …
A comprehensive survey on encryption techniques for digital images
With the widespread adoption of smart devices and high-speed networks, investigators are
focusing on securing digital image applications, such as those on social media, in …
focusing on securing digital image applications, such as those on social media, in …
A new image encryption algorithm based on chaos and secure hash SHA-256
S Zhu, C Zhu, W Wang - Entropy, 2018 - mdpi.com
In order to overcome the difficulty of key management in “one time pad” encryption schemes
and also resist the attack of chosen plaintext, a new image encryption algorithm based on …
and also resist the attack of chosen plaintext, a new image encryption algorithm based on …
A novel color image encryption algorithm based on spatial permutation and quantum chaotic map
SM Seyedzadeh, B Norouzi, MR Mosavi… - Nonlinear …, 2015 - Springer
In recent years, several algorithms of secure image encryption were studied and developed
through chaotic processes. Most of the previous algorithms encrypt color components …
through chaotic processes. Most of the previous algorithms encrypt color components …
A novel image encryption based on hash function with only two-round diffusion process
B Norouzi, SM Seyedzadeh, S Mirzakuchaki… - Multimedia …, 2014 - Springer
In this paper, a novel algorithm for image encryption based on hash function is proposed. In
our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 …
our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 …
A new hyperchaotic map and its application in an image encryption scheme
Recently, the hyperchaotic maps have been investigated in order to develop more secure
encryption schemes. In this paper we propose a new hyperchaotic map derived from …
encryption schemes. In this paper we propose a new hyperchaotic map derived from …
Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol
For the asymmetric key, the Diffie Hellman Key (DHK) protocol is very efficient, but
sometimes it is vulnerable against brute force attacks if the parameters are not chosen …
sometimes it is vulnerable against brute force attacks if the parameters are not chosen …
A secure image encryption method using scan pattern and random key stream derived from laser chaos
T Sivakumar, P Li - Optics & Laser Technology, 2019 - Elsevier
Internet allows people in any corner of the world to share instantly all types of information.
Secure sharing of sensitive multimedia data necessitates confidentiality service, which is …
Secure sharing of sensitive multimedia data necessitates confidentiality service, which is …
[PDF][PDF] A survey on different image encryption and decryption techniques
This paper focuses mainly on the different kinds of image encryption and decryption
techniques. In addition focuses on image encryption techniques, As the use digital …
techniques. In addition focuses on image encryption techniques, As the use digital …
A new efficient lightweight and secure image cipher scheme
The protection of multimedia content has become a key area of research, since very often a
user's privacy and confidentiality can be at risk. Although a large number of image …
user's privacy and confidentiality can be at risk. Although a large number of image …