-
121
A robust approach to satellite image encryption using chaotic map and circulant matrices
Published 2024-12-01“…We conducted simulations using MATLAB to assess the efficiency of the proposed satellite image encryption from theoretical and statistical perspectives. …”
Get full text
Article -
122
An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map
Published 2018-01-01“…We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). …”
Get full text
Article -
123
A secure medical image encryption technique based on DNA cryptography with elliptic curves
Published 2025-06-01“…With progress in imaging technologies and biomedical processing algorithms, the amount of image data increases rapidly. …”
Get full text
Article -
124
Enhancing medical image privacy in IoT with bit-plane level encryption using chaotic map
Published 2025-06-01“…To address this, a novel encryption method for medical images that operates at the bit plane level, tailored for IoT environments, is developed.MethodsThe approach initializes by processing the original image through the Secure Hash Algorithm (SHA) to derive the initial conditions for the Chen chaotic map. …”
Get full text
Article -
125
Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain
Published 2025-01-01“…This paper presents a novel encryption technique that integrates the Deep Convolutional Generative Adversarial Networks (DCGAN) and Virtual Planet Domain (VPD) approach to enhance the protection of medical images. …”
Get full text
Article -
126
CR Assisted IE Guarded Authenticated Biomedical Image Transactions
Published 2018-01-01“…This paper focuses on sensing of the vacant channels, and it is pre-owned for the transmission of encrypted DICOM information. The proposed algorithm involves encryption schemes like RC5, latin square image cipher, deoxyribo nucleic acid, and discrete Gould transform (DGT) to render confusion, diffusion, and permutation operations. …”
Get full text
Article -
127
A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping
Published 2020-01-01“…Simulation results indicate that the novel mapping has better complexity and initial sensitivity and larger key space compared with the original mapping. Then, a new color image encryption algorithm is proposed based on the new chaotic mapping. …”
Get full text
Article -
128
Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency.
Published 2025-01-01“…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256[Formula: see text]256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …”
Get full text
Article -
129
Hardware Implementation of 128-Bit AES Image Encryption with Low Power Techniques on FPGA to VHDL
Published 2024-02-01“…This paper describes the implementation of a low power and high-speed encryption algorithm with high throughput for encrypting the image. …”
Get full text
Article -
130
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01“…The system is combined with the 4×4 Toeplitz matrix to generate an encryption algorithm, validated using security and performance analysis. …”
Get full text
Article -
131
ANALYSIS OF NEW CHAOTIC MAP AND PERFORMANCE EVALUATION IN ITS APPLICATION TO DIGITAL COLOR IMAGE ENCRYPTION
Published 2023-09-01“…This map will be used in chaos-based cryptography as a keystream generator and then it will be processed in the encryption and decryption algorithms through XOR operations. …”
Get full text
Article -
132
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01Subjects: Get full text
Article -
133
A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata
Published 2025-07-01“…To address these challenges, this paper introduces a multi-layer image encryption algorithm that leverages the Logistic-Sine chaotic Map (LSCM) and cellular automata for enhanced security. …”
Get full text
Article -
134
Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction
Published 2025-01-01“…After being losslessly compressed using the Joint Bi-level Image Experts Group (JBIG) algorithm, the location maps are embedded into the encrypted image as auxiliary data, thereby creating ample room for embedding additional data. …”
Get full text
Article -
135
A Novel Hybrid Steganography Approach for Securing Text, Images, and Audio with Robust Encryption in Audio Steganography
Published 2025-04-01“…The method begins with strong AES encryption, which is then followed by a clever scrambling algorithm inspired by the Rubik’s Cube. …”
Get full text
Article -
136
A Real-Time Image Encryption Method of Networked Inverted Pendulum Visual Servo Control System
Published 2020-01-01“…To solve the problem, a fast image encryption method by combining image scaling and improved self-diffusion image encryption (ISDIE) algorithm is firstly proposed, which is employed to encrypt the captured images after they are scaled. …”
Get full text
Article -
137
A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy
Published 2025-08-01“…We suggest a novel image encryption algorithm based on chaotic maps and the variable-step Josephus problem to get over these restrictions and increase the encryption resilience. …”
Get full text
Article -
138
Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes
Published 2021-01-01“…Thorough comparison with other image encryption algorithms is also carried out.…”
Get full text
Article -
139
Dynamical System in Chaotic Neurons with Time Delay Self-Feedback and Its Application in Color Image Encryption
Published 2022-01-01“…In order to investigate the application of this model in image encryption, an image encryption scheme is proposed. …”
Get full text
Article -
140
An Image Encryption Scheme Using a 1D Chaotic Double Section Skew Tent Map
Published 2020-01-01“…To further elaborate on its robustness, a new image encryption algorithm incorporating the function as its random number generator is presented. …”
Get full text
Article