Differential evolution optimization of intertwining logistic map-DNA based image encryption technique
M Dua, A Wesanekar, V Gupta, M Bhola… - Journal of Ambient …, 2020 - Springer
Differential evolution (DE) is a powerful evolutionary algorithms, widely applied in different
fields of science and engineering for solving the problem of optimization. Since image …
fields of science and engineering for solving the problem of optimization. Since image …
A novel ToCC map and two-level scrambling-based medical image encryption technique
S Pankaj, M Dua - Network Modeling Analysis in Health Informatics and …, 2021 - Springer
Since the past few decades, various methods for diagnosis of different diseases have been
introduced in the area of medical science. One such invention is the use of digital images to …
introduced in the area of medical science. One such invention is the use of digital images to …
An ILM-cosine transform-based improved approach to image encryption
M Dua, A Suthar, A Garg, V Garg - Complex & Intelligent Systems, 2021 - Springer
The chaos-based cryptography techniques are used widely to protect digital information
from intruders. The chaotic systems have some of special features that make them suitable …
from intruders. The chaotic systems have some of special features that make them suitable …
Medical video encryption using novel 2D Cosine-Sine map and dynamic DNA coding
D Dhingra, M Dua - Medical & Biological Engineering & Computing, 2024 - Springer
Modern healthcare systems contain a large amount of sensitive information related to a
patient in textual and visual form. Surgical videos and diagnosis data such as ultrasound …
patient in textual and visual form. Surgical videos and diagnosis data such as ultrasound …
A novel exponent–sine–cosine chaos map-based multiple-image encryption technique
This paper proposes a multiple-image encryption (MIE) approach that uses a novel
exponent–sine–cosine (ESC) chaotic map along with the dynamic permutation and DNA …
exponent–sine–cosine (ESC) chaotic map along with the dynamic permutation and DNA …
Image encryption and decryption system through a hybrid approach using the jigsaw transform and langton's ant applied to retinal fundus images
A Romero-Arellano, E Moya-Albor, J Brieva… - Axioms, 2021 - mdpi.com
In this work, a new medical image encryption/decryption algorithm was proposed. It is based
on three main parts: the Jigsaw transform, Langton's ant, and a novel way to add …
on three main parts: the Jigsaw transform, Langton's ant, and a novel way to add …
A novel chaos map based medical image encryption scheme
In the medical industry, digital images are frequently used to diagnose a variety of diseases.
These images comprise of lot of secret information regarding health of the patient. Image …
These images comprise of lot of secret information regarding health of the patient. Image …
A novel Cosine-Cosine chaotic map-based video encryption scheme
S Kumari, M Dua, S Dua, D Dhingra - Journal of Engineering and Applied …, 2024 - Springer
The surge in online activities has led to the increasing popularity of sharing video data
across diverse applications, including online education tutorials, social networking, video …
across diverse applications, including online education tutorials, social networking, video …
An improved approach for multiple image encryption using alternate multidimensional chaos and Lorenz attractor
This chapter proposes a multiple image encryption method based on multi-dimensional
chaotic equations. Four-dimensional differential chaotic equations of Lorenz attractor have …
chaotic equations. Four-dimensional differential chaotic equations of Lorenz attractor have …
An Adaptive-Selective Image Encryption With JSMP Map and Square-Wave Shuffling
M Packirisamy, JS Muthu, PM Kumar - Machine Learning and …, 2024 - igi-global.com
Despite current developments in the discipline of selective image encryption, some of the
most pressing challenges still need to be solved concerning the degree of user-controlled …
most pressing challenges still need to be solved concerning the degree of user-controlled …