Image watermarking using soft computing techniques: A comprehensive survey

OP Singh, AK Singh, G Srivastava, N Kumar - Multimedia Tools and …, 2021 - Springer
Image watermarking techniques are used to provide copyright protection and verify
ownership of media/entities. This technique refers to the concept of embedding of secret …

A new hybrid digital chaotic system with applications in image encryption

M Alawida, A Samsudin, JS Teh, RS Alkhawaldeh - Signal Processing, 2019 - Elsevier
Image encryption provides confidentiality to images by transforming them into
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …

Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption

N Tsafack, J Kengne, B Abd-El-Atty, AM Iliyasu… - Information …, 2020 - Elsevier
We present a simple yet highly dimensional hybrid diode bridge circuit network that can
exhibit complex chaotic behaviours. Further, since our network is characterised by smooth …

An image compression and encryption algorithm based on chaotic system and compressive sensing

L Gong, K Qiu, C Deng, N Zhou - Optics & Laser Technology, 2019 - Elsevier
For a linear image encryption system, it is vulnerable to the chosen-plaintext attack. To
overcome the weakness and reduce the correlation among pixels of the encryption image …

A new combination chaotic system and its application in a new Bit-level image encryption scheme

W Zhou, X Wang, M Wang, D Li - Optics and Lasers in Engineering, 2022 - Elsevier
In this paper, a new combination chaotic system (NCCS) is proposed for image encryption.
The proposed system has larger key space and exhibits better cryptographic features in …

Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map

M Kaur, D Singh, K Sun, U Rawat - Future Generation Computer Systems, 2020 - Elsevier
The secure key generation is the predominant requirement of an image encryption. Chaotic
maps are often considered by the researchers for secure key generation. However, chaotic …

Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion

HS Ye, NR Zhou, LH Gong - Signal Processing, 2020 - Elsevier
A new multi-image encryption scheme based on quaternion discrete fractional Hartley
transform (QDFrHT) and an improved pixel adaptive diffusion is proposed, which can …

Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme

M Wang, X Wang, T Zhao, C Zhang, Z Xia, N Yao - Information Sciences, 2021 - Elsevier
In this paper, an improved cross coupled map lattice (CCML) which is derived from CCML is
proposed. The experimental analysis of CCML shows that it exhibits weak or even lose …

Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis

S Pankaj, M Dua - Information Security Journal: A Global …, 2024 - Taylor & Francis
In the past two decades, we have seen the proliferation of Internet and its applications. The
information exchange happens via images, videos, texts, audio clips, etc. Medical experts …

DNA chaos blend to secure medical privacy

D Ravichandran, P Praveenkumar… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
In this technological era, it is highly essential to protect the digital medical data from the
fraud and forgery as they are transmitted over the public channel. Also with the increased …