Image encryption using dynamic image as a key based on multilayers of chaotic permutation
SW Jirjees, FF Alkalid, WF Shareef - Symmetry, 2023 - mdpi.com
With the rapid expansion of electronic data transmission, unauthorized data access is
growing. Information security against unwanted access is becoming increasingly essential in …
growing. Information security against unwanted access is becoming increasingly essential in …
[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites
FT Abdul Hussien, AMS Rahma… - Security and …, 2021 - Wiley Online Library
Providing security for transmitted data through the e‐commerce environment requires using
a fast and high secure encryption algorithm. Balancing between the speed and the security …
a fast and high secure encryption algorithm. Balancing between the speed and the security …
A survey on stream ciphers for constrained environments
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …
Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption.
FT Abdul Hussien… - International Journal of …, 2023 - search.ebscohost.com
In these days of technology, the usage of images has become increasingly high especially
now that almost everyone has access to internet. Also, image helps us to learn, grabs our …
now that almost everyone has access to internet. Also, image helps us to learn, grabs our …
[PDF][PDF] Selective Medical Image Encryption Using Polynomial-Based Secret Image Sharing and Chaotic Map
Accepted: 10 June 2022 The progressive development in telecommunication and
networking technologies has led to the increased popularity of telemedicine usage, which …
networking technologies has led to the increased popularity of telemedicine usage, which …
[PDF][PDF] 3D Content Encryption Using Multi-Level Chaotic Maps
Nowadays, 3D content is becoming an essential part of multimedia applications, when the
3D content is not protected, hackers may attack and steal it. This paper introduces a …
3D content is not protected, hackers may attack and steal it. This paper introduces a …
[PDF][PDF] 3D Polygon Mesh Encryption Based on 3D Lorenz Chaotic Map.
The multimedia application developments in recent years lead to the widespread of 3D
model applications. It becomes more popular in various fields as well as exchanging it over …
model applications. It becomes more popular in various fields as well as exchanging it over …
Fast image encryption algorithm with random structures
Block encryption algorithms are among the most preferred applications in cryptographic
systems. Block ciphers should have accomplished some requirements for a secure …
systems. Block ciphers should have accomplished some requirements for a secure …
Advanced Encryption Standard (AES) acceleration and analysis using graphical processing unit (GPU)
Graphics processing units (GPUs) have become the target for high-speed and high-
throughput computing in the last decade. The device provides excellent capabilities in …
throughput computing in the last decade. The device provides excellent capabilities in …
[PDF][PDF] Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
SA Jabber, AMA Al-Tameemi… - Int. J. Intell. Eng …, 2022 - researchgate.net
A major component of symmetric cryptosystems is the substitution box (S-box), which is
primarily utilized in existing cryptographic ciphers to ensure secure data sanctuaries. The …
primarily utilized in existing cryptographic ciphers to ensure secure data sanctuaries. The …