Showing 201 - 220 results of 271 for search '(image OR images) encryption algorithm', query time: 0.14s Refine Results
  1. 201

    A high performance approach to ensure image security during transmission by Adithya S Nair, Charvi Upreti, Advaith Arun, Renuka Devi S

    Published 2025-09-01
    “…The approach uses RGB plane bit values with a matrix-based encryption scheme, implemented as a symmetric key algorithm. …”
    Get full text
    Article
  2. 202

    A novel and efficient digital image steganography technique using least significant bit substitution by Shahid Rahman, Jamal uddin, Hameed Hussain, Sabir Shah, Abdu Salam, Farhan Amin, Isabel de la Torre Díez, Debora Libertad Ramírez Vargas, Julio César Martínez Espinosa

    Published 2025-01-01
    “…The LSB substitution method minimizes the error rate in the embedding process and is used to achieve greater reliability. Our proposed image-based steganography algorithm incorporates LSB substitution with Magic Matrix, Multi-Level Encryption Algorithm (MLEA), Secret Key (SK), and transposition, flipping. …”
    Get full text
    Article
  3. 203
  4. 204

    Digital Image Copyright Protection and Management Approach—Based on Artificial Intelligence and Blockchain Technology by Jikuan Xu, Jiamin Zhang, Junhan Wang

    Published 2025-04-01
    “…This study proposes an image copyright registration, protection, and management method based on artificial intelligence and blockchain technology, aiming to address the current challenges of low accuracy in digital copyright infringement judgment, the vulnerability of image fingerprints stored on the chain to tampering, the complexity of encryption algorithms and key acquisition methods through contract calls, and the secure storage of image information during data circulation. …”
    Get full text
    Article
  5. 205

    Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES by Khadeeja Gebor Salim, Saif M. Kh. Al-alak, Majid Jabbar Jawad

    Published 2021-06-01
    “…The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. …”
    Get full text
    Article
  6. 206

    Digital image representation by atomic functions: features for computer vision and machine learning by Viktor Makarichev, Vladimir Lukin, Sergii Kryvenko, Iryna Brysina

    Published 2025-05-01
    “…The focus of this work is to assess whether DAT is suitable for ML and CV applications, particularly in the context of image clustering. We evaluated the performance of the well-known k-means clustering algorithm when applied to DAT images. …”
    Get full text
    Article
  7. 207

    Huffman coding-based data reduction and quadristego logic for secure image steganography by Irsyad Fikriansyah Ramadhan, Ntivuguruzwa Jean De La Croix, Tohari Ahmad, Andre Uzamurengera

    Published 2025-05-01
    “…However, existing steganographic algorithms often face a significant trade-off between payload capacity, image quality, and security. …”
    Get full text
    Article
  8. 208

    Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images by Abeer Al-Hyari, Mua’ad Abu-Faraj, Charlie Obimbo, Moutaz Alazab

    Published 2025-02-01
    “…This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. …”
    Get full text
    Article
  9. 209

    Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map by Weishuai Wu, Yujiao Dong, Guangyi Wang

    Published 2024-01-01
    “…SVD is then applied to both the high-frequency subband of the carrier image after DWT and the encrypted watermark image. …”
    Get full text
    Article
  10. 210

    A novel meaningful secret image sharing method based on Arabic letters by Derya Avci

    Published 2016-11-01
    “…Secret sharing and visual cryptography methods commonly generate noise-like images. The noise-like images have attracted the attention of the attackers and several attacks have been developed to break these encrypted images. …”
    Get full text
    Article
  11. 211

    Blockchain Enabled Secure Medical Data Transmission and Diagnosis Using Golden Jackal Optimization Algorithm with Deep Learning by Kiruthikadevi Kulandaivelu, Sivaraj Rajappan, Vijayakumar Murugasamy

    Published 2024-10-01
    “…The BGJOA-DLSMTD algorithm integrates various levels of operations namely encryption, image acquisition, BC, and diagnostic process. …”
    Get full text
    Article
  12. 212

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. …”
    Get full text
    Article
  13. 213

    Encryption & Hiding Information in Internet Files HTML & XML by Dujan Taha, Ahmed Nori, Najla Ibraheem

    Published 2010-06-01
    “…Then, the encrypted secret message was embedded into an image in the HTML page. …”
    Get full text
    Article
  14. 214
  15. 215

    Joint Data Hiding and Partial Encryption of Compressive Sensed Streams by Cristina-Elena Popa, Constantin-Cristian Damian, Daniela Coltuc

    Published 2025-06-01
    “…On-the-fly insertion avoids the buffering of CS measurements for the subsequent standard encryption and generation of a thumbnail image.…”
    Get full text
    Article
  16. 216

    A Unified Approach to Image Recognition and Cryptography via Flexible Weak Inverse Property Quasigroups by Mohammad Mazyad Hazzazi, Muhammad Nadeem, Muhammad Kamran, Muhammad Arshad, Samuel Asefa Fufa

    Published 2025-01-01
    “…Algebra without associativity can be employed to strengthen the security guaranteed by specific cryptographic algorithms and protocols, as well as to establish new chances for accomplishing cryptographic targets such as encryption, hashing, and digital signatures. …”
    Get full text
    Article
  17. 217

    Metasurface-enabled optical encryption and steganography with enhanced information security by Xing Wen, Bu Changke, Zhang Xiaoyi, Choi Duk-Yong, Li Yang, Yue Wenjing, Cheng Jiaqi, Li Zhancheng, Chen Shuqi, Gao Song

    Published 2025-03-01
    “…By adjusting various combinations of optical keys, three encrypted carrier images are retrieved with high fidelity and negligible crosstalk, and the concealed secret information is successfully extracted through a corresponding decryption algorithm. …”
    Get full text
    Article
  18. 218

    Stochastic Photoresponse‐Driven Perovskite TRNGs for Secure Encryption Systems by Dante Ahn, Minz Lee, Woochul Kim, Yeon Kyung Lee, Jun Young Lee, Gun Young Jung, Hangyeol Choi, Yohan Yoon, Hyun Seok Song, Heon Lee, Minah Seo, Jungwook Min, Yusin Pak

    Published 2025-04-01
    “…Using a 480 000‐bit random sequence, perfect image encryption, ensuring protection against hacking are demonstrated. …”
    Get full text
    Article
  19. 219

    LightLSB: a lightweight secure transmission mechanism for large-scale biometric images in computing limited environment by ZHANG Denghui, SHEN Shengshang, YAO Jiefeng, LI Mohan, LI Aiping

    Published 2025-04-01
    “…To address these problems, a lightweight secure transmission mechanism for large-scale biometric images (LightLSB) was proposed. The existing visual cryptography algorithm was reused, and the quality of decrypted images was gradually improved during preprocessing and post-processing. …”
    Get full text
    Article
  20. 220

    Reversible data hiding in encrypted domain based on fine-grained access control by ZHANG Minqing, PENG Shen, JIANG Chao, DI Fuqiang, DONG Yufeng

    Published 2025-07-01
    “…To improve the embedding rate and security of reversible data hiding algorithms in encrypted images for cloud environments, ciphertext-policy attribute-based encryption and reversible data hiding in encrypted images were organically integrated, and a reversible data hiding algorithm in encrypted images based on fine-grained access control was proposed. …”
    Get full text
    Article