A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes

TA Al-Maadeed, I Hussain, A Anees… - Multimedia Tools and …, 2021 - Springer
We have proposed a robust, secure and efficient image encryption algorithm based on
chaotic maps and algebraic structure. Nowadays, the chaotic cryptosystems gained more …

A novel image encryption technique based on mobius transformation

M Asif, S Mairaj, Z Saeed, MU Ashraf… - Computational …, 2021 - Wiley Online Library
The nonlinear transformation concedes as S‐box which is responsible for the certainty of
contemporary block ciphers. Many kinds of S‐boxes are planned by various authors in the …

Software design and experimental evaluation of a reduced aes for iot applications

M Qasaimeh, RS Al-Qassas, M Ababneh - Future Internet, 2021 - mdpi.com
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main
characteristics are their limited resources and computing capabilities, which pose critical …

Proposed symmetric key cryptography algorithm for data security

A Anand, A Raj, R Kohli, V Bibhu - … International Conference on …, 2016 - ieeexplore.ieee.org
In the race towards the pinnacle of evolution and development, few things have come out on
top and become the crucial weapon or path towards success. Information is one such thing …

Proposed encryption algorithm for data security using matrix properties

DP Jha, R Kohli, A Gupta - 2016 International conference on …, 2016 - ieeexplore.ieee.org
Cryptography is used widely for the purpose of secure communication and password
management. It comprises the techniques of encryption and decryption mechanism. Using …

Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission

M Jallouli, I Sayahi, AB Mabrouk - Multimedia Tools and Applications, 2022 - Springer
The wide range of applications of 3D meshes and the birth of very high-speed networks for
storing 3D models in remote multimedia databases have made the copyright protection of …

Assessment of diverse image encryption mechanisms under prevalent invasion

A Malik, S Jadav, S Gupta - Multimedia Tools and Applications, 2021 - Springer
Image encryption mechanisms provide confidentiality and concealment of information
(image) in transmission over the alleyway, susceptible to prevalent invasions. With …

[PDF][PDF] Research Article A Novel Image Encryption Technique Based on Mobius Transformation

M Asif, S Mairaj, Z Saeed, MU Ashraf, K Jambi… - 2021 - academia.edu
Research Article A Novel Image Encryption Technique Based on Mobius Transformation
Page 1 Research Article A Novel Image Encryption Technique Based on Mobius …

[引用][C] FPGA implementation of cryptographic algorithms using multi-encryption technique

R Kohli, M Kumar - Int J Adv Res Comput Sci Softw Eng, 2013

[引用][C] DIGITAL VLSI ON SYSTEM CHIP DESIGN USING MULTI-HASHING TECHNIQUE