Showing 101 - 120 results of 271 for search '(image OR images) encryption algorithm', query time: 0.15s Refine Results
  1. 101
  2. 102

    Enhanced Laplace integral transform based image encryption technique and its analysis by Shamsa Kanwal, Saba Inam, Amr Yousef, Zaffar Ahmed Shaikh, Fariha Nawaz

    Published 2025-08-01
    “…Applications needing strict security measures might choose the cryptosystem because of its complete approach, which guarantees the integrity and confidentiality of digital images. The proposed approach provides a flexible and efficient solution by combining advanced cryptographic algorithms, mathematical transformations, and chaos theory to create a strong foundation for image encryption in wide range of security-sensitive situations. …”
    Get full text
    Article
  3. 103

    Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3 by Yu Fan, Jingbing Li, Uzair Aslam Bhatti, Saqib Ali Nawaz, Yenwei Chen

    Published 2025-06-01
    “…This article proposes a hybrid digital watermarking algorithm for medical images based on frequency domain transformation and deep learning convolutional neural networks. …”
    Get full text
    Article
  4. 104
  5. 105
  6. 106

    A Method for Randomly Hiding Secret Encrypted Data in Images using Cellular Automata by Ansam Abdulmajeed, Fatima Abdullatif, Wafaa Mustafa

    Published 2019-06-01
    “…The algorithm hid encrypted text into color images in a scattered manner based on randomly generated numbers. …”
    Get full text
    Article
  7. 107

    Innovative Quantum Encryption Method for RGB Images Based on Bit-Planes and Logistic Maps by Saeed Basiri, Laleh Farhang Matin, Mosayeb Naseri

    Published 2025-02-01
    “…The encryption algorithm operates in two phases: first, the quantum image undergoes scrambling through bit-plane manipulation, and second, the scrambled image is mixed with a key image generated using the logistic map. …”
    Get full text
    Article
  8. 108

    Application of LSB Steganography for Encrypted Data Using Triple Transposition Vigenere on Digital Images by Eko Aribowo, Windy Sayyida Amalya, Nur Rochmah Dyah Puji Astuti

    Published 2025-08-01
    “…This study utilizes grayscale and RGB images from the USC SIPI database. Grayscale images offer advantages in terms of storage and algorithm efficiency, while RGB images provide broader color diversity and versatile applications. …”
    Get full text
    Article
  9. 109

    Robust zero-watermarking for color images using hybrid deep learning models and encryption by Hager A. Gharib, Noha M. M. Abdelnapi, Khalid M. Hosny

    Published 2025-08-01
    “…Many existing methods fail to extract stable and distinguishable features, making them vulnerable to image distortions such as compression, filtering, and geometric transformations. …”
    Get full text
    Article
  10. 110
  11. 111

    Entropy-Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems by Xuncai Zhang, Lingfei Wang, Guangzhao Cui, Ying Niu

    Published 2019-01-01
    “…Traditional encryption algorithms are inefficient when applied to image encryption because image data have the characteristics of large data sizes and strong correlations between adjacent pixels. …”
    Get full text
    Article
  12. 112

    Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling by Lei Wang, Wenjun Song, Jiali Di, Xuncai Zhang, Chengye Zou

    Published 2025-01-01
    “…With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. …”
    Get full text
    Article
  13. 113

    Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System by Nehal Abd El-Salam Mohamed, Aliaa Youssif, Hala Abdel-Galil El-Sayed

    Published 2022-01-01
    “…So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. …”
    Get full text
    Article
  14. 114

    Cryptanalysis and Improvement of the Hyper-Chaotic Image Encryption Scheme Based on DNA Encoding and Scrambling by Wei Feng, Yi-Gang He

    Published 2018-01-01
    “…In recent years, hybrid chaotic image encryption schemes combined with the DNA encryption technology or other technologies have become a research focus of many researchers. …”
    Get full text
    Article
  15. 115

    Reversible data hiding in encrypted image based on bit-plane compression of prediction error by Youqing WU, Wenjing MA, Zhaoxia YIN, Yinyin PENG, Xinpeng ZHANG

    Published 2022-08-01
    “…To further improve the performance of reversible data hiding in encrypted image, an algorithm for lossless compression of the prediction error bit-plane using joint encoding was proposed, which could make full use of image redundancy and reserve more embedding room.Firstly, the image owner calculated the prediction error of the image and divided the prediction error bit-plane into non-overlapping blocks of the same size.Then, the prediction error bit-plane was rearranged according to blocks and the rearranged bitstream was compressed by run-length encoding and Huffman encoding to reserve room.The data hider embedded information in the reserved room of the encrypted image.At the receiving end, the legitimate receiver extracted information and recovered images losslessly and separately.Experimental results show that the proposed algorithm makes full use of the bit-plane distribution characteristics and achieves higher embedding performance.The average embedding rates in BOSSbase and BOWS-2 datasets reach 3.763 bpp and 3.642 bpp, which are at least 0.081 bpp and 0.058 bpp higher than the state-of-the-art algorithms.…”
    Get full text
    Article
  16. 116

    Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications by Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan

    Published 2021-01-01
    “…Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
    Get full text
    Article
  17. 117

    Hyperchaotic System-Based PRNG and S-Box Design for a Novel Secure Image Encryption by Erman Özpolat, Vedat Çelik, Arif Gülten

    Published 2025-03-01
    “…A comparative analysis revealed that the proposed S-box structure outperforms existing designs in terms of security and efficiency. A new image encryption algorithm was designed using the PRNG and S-box, and its performance was evaluated on 512 × 512 grayscale images, including the commonly used baboon and pepper images. …”
    Get full text
    Article
  18. 118

    A combinatory approach of non-chain ring and henon map for image encryption application by Salman Mohi Ud Din, Tariq Shah, Fahad Alblehai, Sameer Nooh, Sajjad Shaukat Jamal

    Published 2025-01-01
    “…This algebraic approach utilizes a robust and state-of-the-art image encryption system that is highly effective against potential attackers.…”
    Get full text
    Article
  19. 119

    A novel pythonic paradigm for image encryption using axis-aligned bounding boxes by Abdulbasid Banga, Akifa Abbas, Danish Ali, Nisreen Innab, Ala Saleh Alluhaidan, Nadeem Iqbal, Hossam Diab

    Published 2025-05-01
    “…This research introduces a novel image encryption algorithm designed to safeguard the integrity and confidentiality of sensitive gray-scale digital images. …”
    Get full text
    Article
  20. 120

    New discrete memristive hyperchaotic map: modeling, dynamic analysis, and application in image encryption by Fei Yu, Yiya Wu, Xuqi Wang, Ting He, ShanKou Zhang, Jie Jin

    Published 2025-06-01
    “…Through experiments on various images, we verify the algorithm’s effectiveness in improving encryption strength, reducing information leakage risks, and ensuring data security. …”
    Get full text
    Article