A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
We have proposed a robust, secure and efficient image encryption algorithm based on
chaotic maps and algebraic structure. Nowadays, the chaotic cryptosystems gained more …
chaotic maps and algebraic structure. Nowadays, the chaotic cryptosystems gained more …
A novel image encryption technique based on mobius transformation
The nonlinear transformation concedes as S‐box which is responsible for the certainty of
contemporary block ciphers. Many kinds of S‐boxes are planned by various authors in the …
contemporary block ciphers. Many kinds of S‐boxes are planned by various authors in the …
Software design and experimental evaluation of a reduced aes for iot applications
M Qasaimeh, RS Al-Qassas, M Ababneh - Future Internet, 2021 - mdpi.com
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main
characteristics are their limited resources and computing capabilities, which pose critical …
characteristics are their limited resources and computing capabilities, which pose critical …
Proposed symmetric key cryptography algorithm for data security
In the race towards the pinnacle of evolution and development, few things have come out on
top and become the crucial weapon or path towards success. Information is one such thing …
top and become the crucial weapon or path towards success. Information is one such thing …
Proposed encryption algorithm for data security using matrix properties
DP Jha, R Kohli, A Gupta - 2016 International conference on …, 2016 - ieeexplore.ieee.org
Cryptography is used widely for the purpose of secure communication and password
management. It comprises the techniques of encryption and decryption mechanism. Using …
management. It comprises the techniques of encryption and decryption mechanism. Using …
Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission
The wide range of applications of 3D meshes and the birth of very high-speed networks for
storing 3D models in remote multimedia databases have made the copyright protection of …
storing 3D models in remote multimedia databases have made the copyright protection of …
Assessment of diverse image encryption mechanisms under prevalent invasion
A Malik, S Jadav, S Gupta - Multimedia Tools and Applications, 2021 - Springer
Image encryption mechanisms provide confidentiality and concealment of information
(image) in transmission over the alleyway, susceptible to prevalent invasions. With …
(image) in transmission over the alleyway, susceptible to prevalent invasions. With …
[PDF][PDF] Research Article A Novel Image Encryption Technique Based on Mobius Transformation
M Asif, S Mairaj, Z Saeed, MU Ashraf, K Jambi… - 2021 - academia.edu
Research Article A Novel Image Encryption Technique Based on Mobius Transformation
Page 1 Research Article A Novel Image Encryption Technique Based on Mobius …
Page 1 Research Article A Novel Image Encryption Technique Based on Mobius …