-
221
An Angle- and Polarization-Selective Dual-Wavelength Narrowband Thermal Emitter for Infrared Multilevel Encryption
Published 2025-01-01“…Therefore, encryption technologies that combine digital algorithms with physical keys to further enhance information security are widely studied. …”
Get full text
Article -
222
Compression Sensing Satellite Image Pixel Scrambling Scheme using Unique Seed Generation for Intra-Block Confusion with LP Rotation Mechanism
Published 2025-10-01“…To protect the integrity and confidentiality of critical geospatial data used in defense, disaster management, and environmental monitoring, robust satellite image encryption is imperative. Existing algorithms often prioritize security at the expense of processing speed or data fidelity. …”
Get full text
Article -
223
A hybrid model for multimedia data compression using generative adversarial networks and chaotic encryption
Published 2025-12-01“…The images are encrypted using chaotic encryption scheme involving Arnold’s cat map and Chen’s chaotic system. …”
Get full text
Article -
224
A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
Published 2016-07-01“…The proposed encryption schema is built upon GASONeC algorithm (Elhoseny et al., 2014) that uses genetic algorithm to build the optimum network structure in the form of clusters. …”
Get full text
Article -
225
Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks
Published 2024-01-01“…Next, one trains a model to identify the encryption key by using expertise of the underpinning encryption algorithm. …”
Get full text
Article -
226
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map
Published 2022-01-01“…In this work, a secure image encryption scheme is proposed using linear feedback shift register (LFSR) and chaos-based quantum chaotic map. …”
Get full text
Article -
227
Secure S-box construction with 1D chaotic maps and finite field theory for block cipher encryption
Published 2025-06-01“…The article also includes an image encryption approach utilizing S-boxes. Finally, we believe that the strategy for developing long-lasting and reliable s-box solutions for block cipher systems contributes significantly to subsequent studies on architectural principles.…”
Get full text
Article -
228
Data protection enhancement in smart grid communication: An efficient multi-layer encrypting approach based on chaotic techniques and steganography
Published 2024-12-01“…The suggested system is analyzed using fundamental performance assessment metrics say as average processing times across ten runs, peak signal-to-noise ratio (PSNR), and root mean square error (RMSE). The encryption process involves hiding the data encrypted by a digital dictionary and the advanced encryption standard (AES) algorithm in an image. …”
Get full text
Article -
229
Voice Security Using Hybrid Algorithm
Published 2010-12-01“…This research deals with constructing and implementing a new digital voice security Algorithm based on hiding large amount of data (sound file) in a 24 bits host color image (RGB image). …”
Get full text
Article -
230
Drone-Captured Wildlife Data Encryption: A Hybrid 1D–2D Memory Cellular Automata Scheme with Chaotic Mapping and SHA-256
Published 2024-11-01“…However, the sensitive data captured by drones, including images and videos, require robust encryption to prevent unauthorized access and exploitation. …”
Get full text
Article -
231
Using the Genetic Algorithm in Developing a Method for Steganography
Published 2013-12-01“…This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two phases, the first divide the cover image (.BMP, .PNG) to a group of sections (Blocks) with the diagonal sequence and make hiding using the cell of the least Significant Bit (LSB) within (Bytes) of certain randomly, and then using the Genetic Algorithm (GA) and working at the expense of Peak Signal to Noise Ratio(PSNR) for each section after the steganography and then get the best PSNR value of the optimal section (ie, a better distribution of the random sites). …”
Get full text
Article -
232
Research on color QR code watermarking technology based on chaos theory
Published 2018-07-01“…In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was proposed as a preprocessing step of digital watermarking algorithm.Then a color QR code digital watermarking algorithm was designed based on discrete wavelet transform and matrix singular value decomposition.Finally,the feasibility of the algorithm was verified by experiments.The results show that the proposed method has good resistance to JPEG compression,noise attack and cropping attack.…”
Get full text
Article -
233
Modify PRESENT Algorithm by New technique and key Generator by External unit
Published 2023-04-01“…The developed algorithm achieved a high speed of execution faster than the original algorithm and passed standard tests for various files (text, image, audio, video). …”
Get full text
Article -
234
Noise Impact Analysis in Computer-Generated Holography Based on Dual Metrics Evaluation via Peak Signal-to-Noise Ratio and Structural Similarity Index Measure
Published 2025-05-01“…The findings provide theoretical guidance for noise suppression, parameter optimization, and algorithm selection in CGH systems, advancing its applications in optical encryption and high-precision imaging.…”
Get full text
Article -
235
Transceiver Design of a Secure Multiuser FDSS-Based DFT-Spread OFDM System for RIS- and UAV-Assisted THz Communications
Published 2025-01-01“…Our proposed simulated system highlights more suitable performance matrices for a typical case of three users for color image transmission. We introduced a six-dimensional hyperchaotic system-based encryption algorithm to enhance the physical layer security (PLS) of a UAV-to-ground communication network. …”
Get full text
Article -
236
Integrated WHT- and DFT-Based Multiuser Massive MIMO System for Secure RIS-Enabled mmWave Communications
Published 2025-01-01“…PLS encryption based on a 2D hyperchaotic system significantly improves the confidentiality of the color image signal transmission. …”
Get full text
Article -
237
HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers
Published 2025-04-01“…Due to the sensitive nature of these datasets, secure deep learning (DL) algorithms are essential. Although, fully homomorphic encryption (FHE)-based methods have been proposed to maintain data confidentiality and privacy, however, existing FHE deep convolutional neural network (CNN) models still face some issues such as low accuracy, high encryption/decryption latency, energy inefficiency, long feature extraction times, and significant cipher-image expansion. …”
Get full text
Article -
238
Impossible differential cryptanalysis of reduced-round <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><msup><mrow><mi mathvariant="bold-...
Published 2024-11-01“…></graphic></alternatives></inline-formula>, and the time complexity of 13 rounds of algorithm encryptions is <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M12"><msup><mrow><mn mathvariant="normal">2</mn></mrow><mrow><mn mathvariant="normal">65.3</mn></mrow></msup></math><graphic specific-use="big" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/22C9D519-EA4F-4e54-A8CF-1ACB826F2179-M012.jpg"><?…”
Get full text
Article -
239
A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode
Published 2022-05-01“…In the described algorithm, the identification of secret information from text files is hard due to less redundant bits in the text as compared to the image, audio, and video steganographic mediums. …”
Get full text
Article -
240
Transceiver Design for Full-Duplex UAV Based Zero-Padded OFDM System With Physical Layer Security
Published 2021-01-01“…In this proposed system, intertwining logistic map (ILM)-cosine transform aided encryption algorithm combined with artificial noise enhancing physical layer security (PLS) is introduced. …”
Get full text
Article