Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network
X Wang, S Gao - Information sciences, 2020 - Elsevier
In this paper, a chaotic image encryption algorithm based on the matrix semi-tensor product
(STP) with a compound secret key is designed. First, a new scrambling method is designed …
(STP) with a compound secret key is designed. First, a new scrambling method is designed …
Multiple grayscale image encryption using cross-coupled chaotic maps
KAK Patro, A Soni, PK Netam, B Acharya - Journal of Information Security …, 2020 - Elsevier
This paper proposes a newly developed multiple grayscale image encryption scheme using
cross-coupling of two Piece-wise Linear Chaotic Maps (PWLCM). In this scheme, cross …
cross-coupling of two Piece-wise Linear Chaotic Maps (PWLCM). In this scheme, cross …
A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach
A Banu S, R Amirtharajan - Medical & biological engineering & computing, 2020 - Springer
Today's technological era, the booming desire for e-healthcare has inflated the attention
towards the security of data from cyber attacks. As the digital medical images are transferred …
towards the security of data from cyber attacks. As the digital medical images are transferred …
Cryptanalysis of an image block encryption algorithm based on chaotic maps
Y Ma, C Li, B Ou - Journal of Information Security and Applications, 2020 - Elsevier
Recently, an image block encryption algorithm was proposed based on some well-known
chaotic maps. The authors claim that the encryption algorithm achieves enough security …
chaotic maps. The authors claim that the encryption algorithm achieves enough security …
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding
N Iqbal, M Hanif, S Abbas, MA Khan… - Journal of Information …, 2021 - Elsevier
Hundreds of image encryption schemes based on the conventional 2D image space exist in
the literature. Very few were built using the 3D image space. In this study, for better security …
the literature. Very few were built using the 3D image space. In this study, for better security …
Primitively visually meaningful image encryption: A new paradigm
R Zhao, Y Zhang, Y Nan, W Wen, X Chai, R Lan - Information Sciences, 2022 - Elsevier
Traditional image encryption schemes turn images with rich visual contents into
meaningless noise-like ones. This assures privacy security at the expense of visual …
meaningless noise-like ones. This assures privacy security at the expense of visual …
DNA and plaintext dependent chaotic visual selective image encryption
JS Khan, W Boulila, J Ahmad, S Rubaiee… - IEEE …, 2020 - ieeexplore.ieee.org
Visual selective image encryption can both improve the efficiency of the image encryption
algorithm and reduce the frequency and severity of attacks against data. In this article, a new …
algorithm and reduce the frequency and severity of attacks against data. In this article, a new …
An image encryption scheme based on double chaotic cyclic shift and Josephus problem
R Wang, GQ Deng, XF Duan - Journal of Information Security and …, 2021 - Elsevier
In recent years, image encryption has become a very popular and effective method to protect
digital images. Among many image encryption methods, the image encryption algorithm …
digital images. Among many image encryption methods, the image encryption algorithm …
Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map
S Zhu, C Zhu - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, a five-dimensional discrete hyperchaotic map is constructed by combining
Logistic map and 3D discrete Lorenz map. Based on this chaotic system, a block-based …
Logistic map and 3D discrete Lorenz map. Based on this chaotic system, a block-based …
Combined interleaved pattern to improve confusion-diffusion image encryption based on hyperchaotic system
E Winarno, K Nugroho, PW Adi - IEEE Access, 2023 - ieeexplore.ieee.org
The quality of encryption is dependent on the complexity of the confusion-diffusion pattern
and the quality of the keystream employed. To enhance complexity and randomness, this …
and the quality of the keystream employed. To enhance complexity and randomness, this …