A survey of image encryption algorithms
Security of data/images is one of the crucial aspects in the gigantic and still expanding
domain of digital transfer. Encryption of images is one of the well known mechanisms to …
domain of digital transfer. Encryption of images is one of the well known mechanisms to …
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …
Flexible architectures for cryptographic algorithms—A systematic literature review
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …
data over an unsecured public channel. In order to use these algorithms in real-time …
Efficient security and authentication for edge-based internet of medical things
SA Parah, JA Kaw, P Bellavista… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Medical Things (IoMT)-driven smart health and emotional care is revolutionizing
the healthcare industry by embracing several technologies related to multimodal …
the healthcare industry by embracing several technologies related to multimodal …
Analysis of security and privacy issues of information management of big data in B2B based healthcare systems
BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …
and efficient data transmission if business-to-business (B2B) methods were more widely …
Green ICT communication, networking and data processing
Green ICT is the Green Information Technology or Green computing and it is required for
keeping the Harmless Green Environment even when people are using Electronic …
keeping the Harmless Green Environment even when people are using Electronic …
CASDC: a cryptographically secure data system based on two private key images
Colored digital images are one of the most important types of digital data to be used in many
vital applications, which require a safe way to protect them from hacking operations and the …
vital applications, which require a safe way to protect them from hacking operations and the …
An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms
MH Abood - 2017 annual conference on new trends in …, 2017 - ieeexplore.ieee.org
For secure data transmission over internet, it is important to transfer data in high security and
high confidentiality, information security is the most important issue of data communication in …
high confidentiality, information security is the most important issue of data communication in …
Chaos-based joint speech encryption scheme using SHA-1
G Kaur, K Singh, HS Gill - Multimedia tools and applications, 2021 - Springer
In this paper, the speech signal is encrypted using multiple chaotic maps and cryptographic
protocols. The input signal is fragmented and scrambled into four segments using cubic …
protocols. The input signal is fragmented and scrambled into four segments using cubic …
Advancements in social data security and encryption: A review
YS Sangwan, S Lal, P Bhambri, A Kumar… - NVEO-Natural Volatiles & …, 2021 - nveo.org
These days message application administrations are in extraordinary interest, as they
offered start to finish encryption (E2EE) that is fundamental to give security to the clients …
offered start to finish encryption (E2EE) that is fundamental to give security to the clients …