Showing 181 - 200 results of 271 for search '(image OR images) encryption algorithm', query time: 0.16s Refine Results
  1. 181

    Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem by Zeyu Liu, Tiecheng Xia, Jinbo Wang

    Published 2018-01-01
    “…Finally, the image encryption algorithm is analysed in four main aspects that indicate the proposed algorithm is better than others.…”
    Get full text
    Article
  2. 182

    A Wide-Range Adjustable Conservative Memristive Hyperchaotic System with Transient Quasi-Periodic Characteristics and Encryption Application by Fei Yu, Bohong Tan, Ting He, Shaoqi He, Yuanyuan Huang, Shuo Cai, Hairong Lin

    Published 2025-02-01
    “…Through security analysis, the feasibility and security of the image-encryption algorithm were confirmed.…”
    Get full text
    Article
  3. 183

    Triple-layered security system: reliable and secured image communications over 5G and beyond networks by Tarek Srour, Mohsen A. M. El-Bendary, Mostafa Eltokhy, Atef E. Abouelazm

    Published 2025-08-01
    “…The Triple-level security system consists of three combined/ merged security levels, the classified images are encrypted by two chaos-based tools, the encrypted images are embedded into another fake image or audio file using Singular Value Decomposition-Discrete Wavelet Transform (SVD-DWT) based techniques. …”
    Get full text
    Article
  4. 184

    The Itinerary of the N-Type Map and Its Application by Ruisong Ye

    Published 2025-03-01
    “…As a practical application in the field of image security, two image scrambling encryption algorithms are proposed and implemented.…”
    Get full text
    Article
  5. 185

    Conic curve encryption and digital signature based on complex number theory for cybersecurity applications by Ahmed Kamal, H. A. El-Kamchochi, Adel El-Fahar, Esam A. A. Hagras

    Published 2025-07-01
    “…Abstract Secure image transmission requires robust algorithms to ensure authentication, integrity, non-repudiation, and confidentiality. …”
    Get full text
    Article
  6. 186
  7. 187

    A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing by Priyanka Rajan Kumar, Sonia Goel

    Published 2025-04-01
    “…The system employs the K-Nearest Neighbors (KNN) classification algorithm to categorize data into sensitive and normal types. …”
    Get full text
    Article
  8. 188

    Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation by S. Subathra, V. Thanikaiselvan

    Published 2025-07-01
    “…Abstract Medical image encryption is important for maintaining the confidentiality of sensitive medical data and protecting patient privacy. …”
    Get full text
    Article
  9. 189

    A privacy preserving machine learning framework for medical image analysis using quantized fully connected neural networks with TFHE based inference by Sadhana Selvakumar, B. Senthilkumar

    Published 2025-07-01
    “…Abstract Medical image analysis using deep learning algorithms has become a basis of modern healthcare, enabling early detection, diagnosis, treatment planning, and disease monitoring. …”
    Get full text
    Article
  10. 190

    Fragile watermarking technique for detecting image by Yu-hong CHANG, Hui-fen HUANG, Zhi-hong WANG

    Published 2017-07-01
    “…Aiming at the problem of image tampering and forensic localization,a fragile watermarking algorithm based on chaos sequence and image QR decomposition was proposed to determine the image tampering.The algorithm chooses QR decomposition to decompose the image,embeds the watermark after the image is decomposed,and encrypts the watermark by chaotic system to enhance the security of the watermark.Experimental results show that the algorithm not only improves the security of the location watermarking algorithm,but also can estimate the tampering strength of the tampered area.…”
    Get full text
    Article
  11. 191

    A lightweight encryption algorithm for resource-constrained IoT devices using quantum and chaotic techniques with metaheuristic optimization by Amer Aljaedi, Adel R. Alharbi, Abdullah Aljuhni, Moahd K. Alghuson, Shafi Alassmi, Arslan Shafique

    Published 2025-04-01
    “…This research introduces a novel lightweight encryption algorithm optimized with metaheuristic techniques, incorporating quantum encryption, confusion and diffusion operations, discrete wavelet transform (DWT), and multiple chaotic maps. …”
    Get full text
    Article
  12. 192

    Chaotic Image Steganography using DCT and DWT by Nadia Mohammed

    Published 2013-09-01
    “…The researchers was interest in the issue of security from long time ago  even  arrived to the current age (the digital age), and because of the importance of this topic and the challenges in it, so this work which included  study and application of new algorithm is proposed to achieve a high level of  security by encrypting the secret message  (image) using the Logistic  Chaotic  function  after the implementation of  Discrete Wavelet Transform (DWT). …”
    Get full text
    Article
  13. 193

    Image and audio steganography based on indirect LSB by Zainab Namh Sultani, Ban Nadeem Dhannoon

    Published 2021-08-01
    “…In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. …”
    Get full text
    Article
  14. 194

    Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG

    Published 2023-02-01
    “…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
    Get full text
    Article
  15. 195

    A New Approach Combining RSA and ElGamal Algorithms: Advancements in Encryption and Digital Signatures Using Gaussian Integers by Yahia Awad, Douaa Jomaa, Yousuf Alkhezi, Ramiz Hindi

    Published 2025-03-01
    “…This article introduces a novel approach that integrates the ElGamal and RSA algorithms to advance the security and efficiency of public-key cryptosystems. …”
    Get full text
    Article
  16. 196

    Coupling Heterogeneous Neural Networks With Memristors by Li Zhang, Rongli Jiang, Yike Ma, Xiangkai Pu, Zhongyi Li

    Published 2025-01-01
    “…Finally, we propose a DNA-based image encryption algorithm leveraging chaotic sequences generated by the network. …”
    Get full text
    Article
  17. 197

    On the Search for Supersingular Elliptic Curves and Their Applications by Ismel Martinez-Diaz, Rashad Ali, Muhammad Kamran Jamil

    Published 2025-01-01
    “…The key components of replacement, which is a fundamental step in the encryption process that shuffles and encrypts the data inside images, are S-boxes. …”
    Get full text
    Article
  18. 198

    A Combination of Hill Cipher and LSB for Image Security by Ibnu Utomo Wahyu Mulyono, Ajib Susanto, Muhamad Rizky Fajar Febrian, Ghaitsa Ardelia Rosyida

    Published 2020-06-01
    “…The Least Significant Bit (LSB) method is used to insert the ciphertext that has been generated from the hill cipher algorithm, has been testing using RGB, CMY, CMYK and YUV shapes with 6142 characters in 128 x 128 character images producing the highest PSNR value of 51.2826 dB in CMYK images. …”
    Get full text
    Article
  19. 199

    Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security by Afthar Kautsar, Muhammad Ikhsan

    Published 2025-03-01
    “…In today's digital era, data security has become a crucial aspect due to the vast amount of information being transmitted and stored electronically. The Advanced Encryption Standard (AES) is one of the most widely used encryption algorithms because of its high level of security. …”
    Get full text
    Article
  20. 200

    Cryptanalysis of image confidentiality scheme based on hybrid chaotic maps by Majid Khan, Noor Munir

    Published 2025-07-01
    “…Abstract Chaos-based encryption has come to prominence as an efficient and lightweight approach to secure image communication. …”
    Get full text
    Article