Showing 221 - 240 results of 271 for search '(image OR images) encryption algorithm', query time: 0.13s Refine Results
  1. 221

    An Angle- and Polarization-Selective Dual-Wavelength Narrowband Thermal Emitter for Infrared Multilevel Encryption by Xuan Zhang, Zhengji Wen, Qingzi Li, Zhanpeng Wang, Yusong Sheng, Zhengai Chen, Wenchao Zhao, Meng Guo, He Zhu, Ning Dai, Yuchuan Shao

    Published 2025-01-01
    “…Therefore, encryption technologies that combine digital algorithms with physical keys to further enhance information security are widely studied. …”
    Get full text
    Article
  2. 222

    Compression Sensing Satellite Image Pixel Scrambling Scheme using Unique Seed Generation for Intra-Block Confusion with LP Rotation Mechanism by Ram Chandra Barik, Devendra Kumar Yadav, Pragyan Mishra

    Published 2025-10-01
    “…To protect the integrity and confidentiality of critical geospatial data used in defense, disaster management, and environmental monitoring, robust satellite image encryption is imperative. Existing algorithms often prioritize security at the expense of processing speed or data fidelity. …”
    Get full text
    Article
  3. 223

    A hybrid model for multimedia data compression using generative adversarial networks and chaotic encryption by P.T. Sivagurunathan, A. Sridevi

    Published 2025-12-01
    “…The images are encrypted using chaotic encryption scheme involving Arnold’s cat map and Chen’s chaotic system. …”
    Get full text
    Article
  4. 224

    A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption by Mohamed Elhoseny, Hamdy Elminir, Alaa Riad, Xiaohui Yuan

    Published 2016-07-01
    “…The proposed encryption schema is built upon GASONeC algorithm (Elhoseny et al., 2014) that uses genetic algorithm to build the optimum network structure in the form of clusters. …”
    Get full text
    Article
  5. 225

    Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks by Amjed A. Ahmed, Mohammad Kamrul Hasan, Azana H. Aman, Nurhizam Safie, Shayla Islam, Fatima A. Ahmed, Thowiba E. Ahmed, Bishwajeet Pandey, Leila Rzayeva

    Published 2024-01-01
    “…Next, one trains a model to identify the encryption key by using expertise of the underpinning encryption algorithm. …”
    Get full text
    Article
  6. 226

    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map by Adel R. Alharbi, Jawad Ahmad, null Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, William J Buchanan

    Published 2022-01-01
    “…In this work, a secure image encryption scheme is proposed using linear feedback shift register (LFSR) and chaos-based quantum chaotic map. …”
    Get full text
    Article
  7. 227

    Secure S-box construction with 1D chaotic maps and finite field theory for block cipher encryption by Sajjad Shaukat Jamal, Rashad Ali, Muhammad Kamran Jamil, Sameer Abdullah Nooh, Fahad Alblehai, Gulraiz

    Published 2025-06-01
    “…The article also includes an image encryption approach utilizing S-boxes. Finally, we believe that the strategy for developing long-lasting and reliable s-box solutions for block cipher systems contributes significantly to subsequent studies on architectural principles.…”
    Get full text
    Article
  8. 228

    Data protection enhancement in smart grid communication: An efficient multi-layer encrypting approach based on chaotic techniques and steganography by Osama abd Qasim, Sajjad Golshannavaz

    Published 2024-12-01
    “…The suggested system is analyzed using fundamental performance assessment metrics say as average processing times across ten runs, peak signal-to-noise ratio (PSNR), and root mean square error (RMSE). The encryption process involves hiding the data encrypted by a digital dictionary and the advanced encryption standard (AES) algorithm in an image. …”
    Get full text
    Article
  9. 229

    Voice Security Using Hybrid Algorithm by Alyaa Abdul Majeed Haleem

    Published 2010-12-01
    “…This research deals with constructing and implementing a new digital voice security Algorithm based on hiding large amount of data (sound file) in a 24 bits host color image (RGB image). …”
    Get full text
    Article
  10. 230

    Drone-Captured Wildlife Data Encryption: A Hybrid 1D–2D Memory Cellular Automata Scheme with Chaotic Mapping and SHA-256 by Akram Belazi, Héctor Migallón

    Published 2024-11-01
    “…However, the sensitive data captured by drones, including images and videos, require robust encryption to prevent unauthorized access and exploitation. …”
    Get full text
    Article
  11. 231

    Using the Genetic Algorithm in Developing a Method for Steganography by Nadia Mohammed

    Published 2013-12-01
    “…This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two phases, the first divide the cover image (.BMP, .PNG) to a group of sections (Blocks) with the diagonal sequence and make hiding using the cell of the least Significant Bit (LSB) within (Bytes) of certain randomly, and then using the Genetic Algorithm (GA) and working at the expense of Peak Signal to Noise Ratio(PSNR)  for each section after the steganography and then get the best PSNR value of the optimal section (ie, a better distribution of the random sites). …”
    Get full text
    Article
  12. 232

    Research on color QR code watermarking technology based on chaos theory by Xi YIN, Weiqing HUANG

    Published 2018-07-01
    “…In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was proposed as a preprocessing step of digital watermarking algorithm.Then a color QR code digital watermarking algorithm was designed based on discrete wavelet transform and matrix singular value decomposition.Finally,the feasibility of the algorithm was verified by experiments.The results show that the proposed method has good resistance to JPEG compression,noise attack and cropping attack.…”
    Get full text
    Article
  13. 233

    Modify PRESENT Algorithm by New technique and key Generator by External unit by Ahmed Abdullah Khalil, Awny Muhammed Kaftan, Maytham Mustafa Hammoud

    Published 2023-04-01
    “…The developed algorithm achieved a high speed of execution faster than the original algorithm and passed standard tests for various files (text, image, audio, video). …”
    Get full text
    Article
  14. 234

    Noise Impact Analysis in Computer-Generated Holography Based on Dual Metrics Evaluation via Peak Signal-to-Noise Ratio and Structural Similarity Index Measure by Yucheng Li, Yang Zhang, Deyu Jia, Song Gao, Muqun Zhang

    Published 2025-05-01
    “…The findings provide theoretical guidance for noise suppression, parameter optimization, and algorithm selection in CGH systems, advancing its applications in optical encryption and high-precision imaging.…”
    Get full text
    Article
  15. 235

    Transceiver Design of a Secure Multiuser FDSS-Based DFT-Spread OFDM System for RIS- and UAV-Assisted THz Communications by Md. Najmul Hossain, Kottakkaran Sooppy Nisar, Tetsuya Shimamura, Md. Rakibul Islam, Sk. Tamanna Kamal, Shaikh Enayet Ullah

    Published 2025-01-01
    “…Our proposed simulated system highlights more suitable performance matrices for a typical case of three users for color image transmission. We introduced a six-dimensional hyperchaotic system-based encryption algorithm to enhance the physical layer security (PLS) of a UAV-to-ground communication network. …”
    Get full text
    Article
  16. 236

    Integrated WHT- and DFT-Based Multiuser Massive MIMO System for Secure RIS-Enabled mmWave Communications by Md. Najmul Hossain, Md. Rakibul Islam, S. K. Tamanna Kamal, Atia Kaniz, Shaikh Enayet Ullah, Tetsuya Shimamura

    Published 2025-01-01
    “…PLS encryption based on a 2D hyperchaotic system significantly improves the confidentiality of the color image signal transmission. …”
    Get full text
    Article
  17. 237

    HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers by Opeyemi Lateef Usman, Ravie Chandren Muniyandi, Khairuddin Omar, Mazlyfarina Mohamad, Ayoade Akeem Owoade, Morufat Adebola Kareem

    Published 2025-04-01
    “…Due to the sensitive nature of these datasets, secure deep learning (DL) algorithms are essential. Although, fully homomorphic encryption (FHE)-based methods have been proposed to maintain data confidentiality and privacy, however, existing FHE deep convolutional neural network (CNN) models still face some issues such as low accuracy, high encryption/decryption latency, energy inefficiency, long feature extraction times, and significant cipher-image expansion. …”
    Get full text
    Article
  18. 238

    Impossible differential cryptanalysis of reduced-round <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><msup><mrow><mi mathvariant="bold-... by DU Xiaoni, YU Tian, JIA Meichun, LIANG Lifang

    Published 2024-11-01
    “…></graphic></alternatives></inline-formula>, and the time complexity of 13 rounds of algorithm encryptions is <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M12"><msup><mrow><mn mathvariant="normal">2</mn></mrow><mrow><mn mathvariant="normal">65.3</mn></mrow></msup></math><graphic specific-use="big" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/22C9D519-EA4F-4e54-A8CF-1ACB826F2179-M012.jpg"><?…”
    Get full text
    Article
  19. 239

    A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode by Allah Ditta, Muhammad Azeem, Shahid Naseem, Khurram Gulzar Rana, Muhammad Adnan Khan, Zafar Iqbal

    Published 2022-05-01
    “…In the described algorithm, the identification of secret information from text files is hard due to less redundant bits in the text as compared to the image, audio, and video steganographic mediums. …”
    Get full text
    Article
  20. 240

    Transceiver Design for Full-Duplex UAV Based Zero-Padded OFDM System With Physical Layer Security by Joarder Jafor Sadique, Shaikh Enayet Ullah, Md. Rabiul Islam, Raad Raad, Abbas Z. Kouzani, M. A. Parvez Mahmud

    Published 2021-01-01
    “…In this proposed system, intertwining logistic map (ILM)-cosine transform aided encryption algorithm combined with artificial noise enhancing physical layer security (PLS) is introduced. …”
    Get full text
    Article