[HTML][HTML] Double image encryption algorithm based on neural network and chaos
Z Man, J Li, X Di, Y Sheng, Z Liu - Chaos, solitons & fractals, 2021 - Elsevier
To realize the secure transmission of double images, this paper proposes a double image
encryption algorithm based on convolutional neural network (CNN) and dynamic adaptive …
encryption algorithm based on convolutional neural network (CNN) and dynamic adaptive …
Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system
This paper takes a holistic approach to propose a comprehensive framework for color image
encryption with some novel features. The framework is designed around a secure encryption …
encryption with some novel features. The framework is designed around a secure encryption …
[PDF][PDF] Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection.
Managing physical objects in the network's periphery is made possible by the Internet of
Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible …
Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible …
An efficient color/grayscale image encryption scheme based on hybrid chaotic maps
Image encryption has become the essential way to secure image information with the high
frequency of multimedia information exchange on the Internet. In this paper, an effective …
frequency of multimedia information exchange on the Internet. In this paper, an effective …
A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations
Medical images possess significant importance in diagnostics when it comes to healthcare
systems. These images contain confidential and sensitive information such as patients' X …
systems. These images contain confidential and sensitive information such as patients' X …
An efficient approach based on privacy-preserving deep learning for satellite image classification
Satellite images have drawn increasing interest from a wide variety of users, including
business and government, ever since their increased usage in important fields ranging from …
business and government, ever since their increased usage in important fields ranging from …
A lightweight image encryption algorithm based on chaotic map and random substitution
Chaotic-maps-based image encryption methods have been a topic of research interest for a
decade. However, most of the proposed methods suffer from slow encryption time or …
decade. However, most of the proposed methods suffer from slow encryption time or …
Image encryption algorithms: A survey of design and evaluation metrics
Y Alghamdi, A Munir - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Ensuring confidentiality and privacy is critical when it comes to sharing images over
unsecured networks such as the internet. Since widely used and secure encryption …
unsecured networks such as the internet. Since widely used and secure encryption …
A new color image encryption technique using DNA computing and Chaos-based substitution box
In many cases, images contain sensitive information and patterns that require secure
processing to avoid risk. It can be accessed by unauthorized users who can illegally exploit …
processing to avoid risk. It can be accessed by unauthorized users who can illegally exploit …
Voting classifier-based intrusion detection for iot networks
Abstract Internet of Things (IoT) is transforming human lives by paving the way for the
management of physical devices on the edge. These interconnected IoT objects share data …
management of physical devices on the edge. These interconnected IoT objects share data …