A color image encryption scheme based on 1D cubic map

A Yahi, T Bekkouche, MEH Daachi, N Diffellah - Optik, 2022 - Elsevier
In this paper, we introduce a new one-dimensional modular chaotic system based on the
composition of the cubic map and the exponential function (1-DCE). The evaluation results …

H3-hybrid multilayered hyper chaotic hyper elliptic curve based image encryption system

N Sasikaladevi, K Geetha, K Sriharshini… - Optics & Laser …, 2020 - Elsevier
Excessive need for digitized images in all domains have necessitated the need for
protecting the images against adversaries for secured transmission in the network. Sensitive …

RADIANT-hybrid multilayered chaotic image encryption system for color images

N Sasikaladevi, K Geetha, K Sriharshini… - Multimedia Tools and …, 2019 - Springer
Rapid growth in the use of digitized images in commercial, business, government and
medical use has led to the need for protecting the images against eavesdroppers and …

[PDF][PDF] Review of image encryption techniques

M Kumar, RAM Lahcen, RN Mohapatra… - Journal of Computing …, 2020 - academia.edu
Security is one of the core areas of study in recent days. Encryption of the image is widely
known as an effective method for its secure transmission. The objective of any image …

A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property

OZ Akif, S Ali, RS Ali, AK Farhan - Bulletin of Electrical Engineering and …, 2021 - beei.org
A remarkable correlation between chaotic systems and cryptography has been established
with sensitivity to initial states, unpredictability, and complex behaviors. In one development …

A novel trigonometric 3D chaotic map and its application in a double permutation-diffusion image encryption

Y Amina, T Bekkouche, MEH Daachi… - Multimedia Tools and …, 2024 - Springer
In this paper, we introduce a new three-dimensional cosines-sinus-cosines (3D-CSC)
chaotic system. The performance evaluations of the proposed system exhibit a high chaotic …

A low-cost image encryption method to prevent model stealing of deep neural network

W Jiang, Z Gong, J Zhan, Z He, W Pan - Journal of Circuits, Systems …, 2020 - World Scientific
Model stealing attack may happen by stealing useful data transmitted from embedded end to
server end for an artificial intelligent systems. In this paper, we are interested in preventing …

Angular similarity based cancelable biometrics authentication for remote/cloud applications

MK Nalini, KR Radhika - AIP Conference Proceedings, 2022 - pubs.aip.org
Data privacy is highly required for remote or any cloud storage applications. Several security
measures are available for protecting data but there are chances for data breaches. To …

[PDF][PDF] Image encryption methodology based on cellular automata

N Albdour - Journal of Theoretical and Applied Information …, 2022 - jatit.org
The paper considers a methodology for encrypting color images, in which the key is the
initial state of an elementary cellular automata for the implementation of evolution based on …

Iris Recognition Approach for Preserving Privacy in Cloud Computing.

N MK, S Samanta - International Journal of Online & …, 2023 - search.ebscohost.com
Biometric identification systems involve securing biometric traits by encrypting them using an
encryption algorithm and storing them in the cloud. In recent decades, iris recognition …