-
181
Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem
Published 2018-01-01“…Finally, the image encryption algorithm is analysed in four main aspects that indicate the proposed algorithm is better than others.…”
Get full text
Article -
182
A Wide-Range Adjustable Conservative Memristive Hyperchaotic System with Transient Quasi-Periodic Characteristics and Encryption Application
Published 2025-02-01“…Through security analysis, the feasibility and security of the image-encryption algorithm were confirmed.…”
Get full text
Article -
183
Triple-layered security system: reliable and secured image communications over 5G and beyond networks
Published 2025-08-01“…The Triple-level security system consists of three combined/ merged security levels, the classified images are encrypted by two chaos-based tools, the encrypted images are embedded into another fake image or audio file using Singular Value Decomposition-Discrete Wavelet Transform (SVD-DWT) based techniques. …”
Get full text
Article -
184
The Itinerary of the N-Type Map and Its Application
Published 2025-03-01“…As a practical application in the field of image security, two image scrambling encryption algorithms are proposed and implemented.…”
Get full text
Article -
185
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications
Published 2025-07-01“…Abstract Secure image transmission requires robust algorithms to ensure authentication, integrity, non-repudiation, and confidentiality. …”
Get full text
Article -
186
-
187
A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing
Published 2025-04-01“…The system employs the K-Nearest Neighbors (KNN) classification algorithm to categorize data into sensitive and normal types. …”
Get full text
Article -
188
Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation
Published 2025-07-01“…Abstract Medical image encryption is important for maintaining the confidentiality of sensitive medical data and protecting patient privacy. …”
Get full text
Article -
189
A privacy preserving machine learning framework for medical image analysis using quantized fully connected neural networks with TFHE based inference
Published 2025-07-01“…Abstract Medical image analysis using deep learning algorithms has become a basis of modern healthcare, enabling early detection, diagnosis, treatment planning, and disease monitoring. …”
Get full text
Article -
190
Fragile watermarking technique for detecting image
Published 2017-07-01“…Aiming at the problem of image tampering and forensic localization,a fragile watermarking algorithm based on chaos sequence and image QR decomposition was proposed to determine the image tampering.The algorithm chooses QR decomposition to decompose the image,embeds the watermark after the image is decomposed,and encrypts the watermark by chaotic system to enhance the security of the watermark.Experimental results show that the algorithm not only improves the security of the location watermarking algorithm,but also can estimate the tampering strength of the tampered area.…”
Get full text
Article -
191
A lightweight encryption algorithm for resource-constrained IoT devices using quantum and chaotic techniques with metaheuristic optimization
Published 2025-04-01“…This research introduces a novel lightweight encryption algorithm optimized with metaheuristic techniques, incorporating quantum encryption, confusion and diffusion operations, discrete wavelet transform (DWT), and multiple chaotic maps. …”
Get full text
Article -
192
Chaotic Image Steganography using DCT and DWT
Published 2013-09-01“…The researchers was interest in the issue of security from long time ago even arrived to the current age (the digital age), and because of the importance of this topic and the challenges in it, so this work which included study and application of new algorithm is proposed to achieve a high level of security by encrypting the secret message (image) using the Logistic Chaotic function after the implementation of Discrete Wavelet Transform (DWT). …”
Get full text
Article -
193
Image and audio steganography based on indirect LSB
Published 2021-08-01“…In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. …”
Get full text
Article -
194
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
Get full text
Article -
195
A New Approach Combining RSA and ElGamal Algorithms: Advancements in Encryption and Digital Signatures Using Gaussian Integers
Published 2025-03-01“…This article introduces a novel approach that integrates the ElGamal and RSA algorithms to advance the security and efficiency of public-key cryptosystems. …”
Get full text
Article -
196
Coupling Heterogeneous Neural Networks With Memristors
Published 2025-01-01“…Finally, we propose a DNA-based image encryption algorithm leveraging chaotic sequences generated by the network. …”
Get full text
Article -
197
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01“…The key components of replacement, which is a fundamental step in the encryption process that shuffles and encrypts the data inside images, are S-boxes. …”
Get full text
Article -
198
A Combination of Hill Cipher and LSB for Image Security
Published 2020-06-01“…The Least Significant Bit (LSB) method is used to insert the ciphertext that has been generated from the hill cipher algorithm, has been testing using RGB, CMY, CMYK and YUV shapes with 6142 characters in 128 x 128 character images producing the highest PSNR value of 51.2826 dB in CMYK images. …”
Get full text
Article -
199
Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security
Published 2025-03-01“…In today's digital era, data security has become a crucial aspect due to the vast amount of information being transmitted and stored electronically. The Advanced Encryption Standard (AES) is one of the most widely used encryption algorithms because of its high level of security. …”
Get full text
Article -
200
Cryptanalysis of image confidentiality scheme based on hybrid chaotic maps
Published 2025-07-01“…Abstract Chaos-based encryption has come to prominence as an efficient and lightweight approach to secure image communication. …”
Get full text
Article