Image encryption using dynamic image as a key based on multilayers of chaotic permutation

SW Jirjees, FF Alkalid, WF Shareef - Symmetry, 2023 - mdpi.com
With the rapid expansion of electronic data transmission, unauthorized data access is
growing. Information security against unwanted access is becoming increasingly essential in …

[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites

FT Abdul Hussien, AMS Rahma… - Security and …, 2021 - Wiley Online Library
Providing security for transmitted data through the e‐commerce environment requires using
a fast and high secure encryption algorithm. Balancing between the speed and the security …

A survey on stream ciphers for constrained environments

SA Jassim, AK Farhan - 2021 1st Babylon International …, 2021 - ieeexplore.ieee.org
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …

Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption.

FT Abdul Hussien… - International Journal of …, 2023 - search.ebscohost.com
In these days of technology, the usage of images has become increasingly high especially
now that almost everyone has access to internet. Also, image helps us to learn, grabs our …

[PDF][PDF] Selective Medical Image Encryption Using Polynomial-Based Secret Image Sharing and Chaotic Map

LA Salman, AT Hashim, AM Hasan - Int. J. Saf. Secur. Eng, 2022 - researchgate.net
Accepted: 10 June 2022 The progressive development in telecommunication and
networking technologies has led to the increased popularity of telemedicine usage, which …

[PDF][PDF] 3D Content Encryption Using Multi-Level Chaotic Maps

NA Ali, AMS Rahma, SH Shaker - Iraqi Journal of Science, 2023 - iasj.net
Nowadays, 3D content is becoming an essential part of multimedia applications, when the
3D content is not protected, hackers may attack and steal it. This paper introduces a …

[PDF][PDF] 3D Polygon Mesh Encryption Based on 3D Lorenz Chaotic Map.

NA Ali, AMS Rahma, SH Shaker - Int. J. Interact. Mob. Technol., 2021 - researchgate.net
The multimedia application developments in recent years lead to the widespread of 3D
model applications. It becomes more popular in various fields as well as exchanging it over …

Fast image encryption algorithm with random structures

T Etem, T Kaya - International Journal of Computers and …, 2023 - Taylor & Francis
Block encryption algorithms are among the most preferred applications in cryptographic
systems. Block ciphers should have accomplished some requirements for a secure …

Advanced Encryption Standard (AES) acceleration and analysis using graphical processing unit (GPU)

HT Assafli, IA Hashim, AA Naser - Applied Nanoscience, 2021 - Springer
Graphics processing units (GPUs) have become the target for high-speed and high-
throughput computing in the last decade. The device provides excellent capabilities in …

[PDF][PDF] Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box

SA Jabber, AMA Al-Tameemi… - Int. J. Intell. Eng …, 2022 - researchgate.net
A major component of symmetric cryptosystems is the substitution box (S-box), which is
primarily utilized in existing cryptographic ciphers to ensure secure data sanctuaries. The …