Showing 121 - 140 results of 271 for search '(image OR images) encryption algorithm', query time: 0.15s Refine Results
  1. 121

    A robust approach to satellite image encryption using chaotic map and circulant matrices by Shamsa Kanwal, Saba Inam, Asghar Ali Shah, Halima Iqbal, Anas Bilal, Muhammad Usman Hashmi, Raheem Sarwar

    Published 2024-12-01
    “…We conducted simulations using MATLAB to assess the efficiency of the proposed satellite image encryption from theoretical and statistical perspectives. …”
    Get full text
    Article
  2. 122

    An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map by Hui Ren, Jun Wang, Qiong-Hua Wang

    Published 2018-01-01
    “…We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). …”
    Get full text
    Article
  3. 123

    A secure medical image encryption technique based on DNA cryptography with elliptic curves by V. N. Senthil Kumaran, T. Manikandan, Rajesh Kumar Dhanaraj, Taher Al-Shehari, Nasser A. Alsadhan, Shitharth Selvarajan

    Published 2025-06-01
    “…With progress in imaging technologies and biomedical processing algorithms, the amount of image data increases rapidly. …”
    Get full text
    Article
  4. 124

    Enhancing medical image privacy in IoT with bit-plane level encryption using chaotic map by Fatima Asiri, Wajdan Al Malwi, Tamara Zhukabayeva, Ibtehal Nafea, Abdullah Aziz, Nadhmi A. Gazem, Abdullah Qayyum

    Published 2025-06-01
    “…To address this, a novel encryption method for medical images that operates at the bit plane level, tailored for IoT environments, is developed.MethodsThe approach initializes by processing the original image through the Secure Hash Algorithm (SHA) to derive the initial conditions for the Chen chaotic map. …”
    Get full text
    Article
  5. 125

    Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain by Manish Kumar, Aneesh Sreevallabh Chivukula, Gunjan Barua

    Published 2025-01-01
    “…This paper presents a novel encryption technique that integrates the Deep Convolutional Generative Adversarial Networks (DCGAN) and Virtual Planet Domain (VPD) approach to enhance the protection of medical images. …”
    Get full text
    Article
  6. 126

    CR Assisted IE Guarded Authenticated Biomedical Image Transactions by K. Revathy, K. Thenmozhi, Rengarajan Amirtharajan, Padmapriya Praveenkumar

    Published 2018-01-01
    “…This paper focuses on sensing of the vacant channels, and it is pre-owned for the transmission of encrypted DICOM information. The proposed algorithm involves encryption schemes like RC5, latin square image cipher, deoxyribo nucleic acid, and discrete Gould transform (DGT) to render confusion, diffusion, and permutation operations. …”
    Get full text
    Article
  7. 127

    A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping by Chunyuan Liu, Qun Ding

    Published 2020-01-01
    “…Simulation results indicate that the novel mapping has better complexity and initial sensitivity and larger key space compared with the original mapping. Then, a new color image encryption algorithm is proposed based on the new chaotic mapping. …”
    Get full text
    Article
  8. 128

    Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency. by Mingyi Huo, Yanpei Zheng, Jun Huang

    Published 2025-01-01
    “…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256[Formula: see text]256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …”
    Get full text
    Article
  9. 129

    Hardware Implementation of 128-Bit AES Image Encryption with Low Power Techniques on FPGA to VHDL by Ali Farmani, Hossein Balazadeh Bahar

    Published 2024-02-01
    “…This paper describes the implementation of a low power and high-speed encryption algorithm with high throughput for encrypting the image. …”
    Get full text
    Article
  10. 130

    A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption by Ali A. Shukur, Ammar Ali Neamah, Viet-Thanh Pham, Giuseppe Grassi

    Published 2025-01-01
    “…The system is combined with the 4×4 Toeplitz matrix to generate an encryption algorithm, validated using security and performance analysis. …”
    Get full text
    Article
  11. 131

    ANALYSIS OF NEW CHAOTIC MAP AND PERFORMANCE EVALUATION IN ITS APPLICATION TO DIGITAL COLOR IMAGE ENCRYPTION by Ita Mar'atu Solihat, Suryadi MT, Yudi Satria

    Published 2023-09-01
    “…This map will be used in chaos-based cryptography as a keystream generator and then it will be processed in the encryption and decryption algorithms through XOR operations. …”
    Get full text
    Article
  12. 132
  13. 133

    A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata by Shiji Sun, Wenzhong Yang, Yabo Yin, Xiaodan Tian, Guanghan Li, Xiangxin Deng

    Published 2025-07-01
    “…To address these challenges, this paper introduces a multi-layer image encryption algorithm that leverages the Logistic-Sine chaotic Map (LSCM) and cellular automata for enhanced security. …”
    Get full text
    Article
  14. 134

    Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction by Yingqiang Qiu

    Published 2025-01-01
    “…After being losslessly compressed using the Joint Bi-level Image Experts Group (JBIG) algorithm, the location maps are embedded into the encrypted image as auxiliary data, thereby creating ample room for embedding additional data. …”
    Get full text
    Article
  15. 135

    A Novel Hybrid Steganography Approach for Securing Text, Images, and Audio with Robust Encryption in Audio Steganography by srinivasa padmaja, Shaik Mahaboob Basha

    Published 2025-04-01
    “…The method begins with strong AES encryption, which is then followed by a clever scrambling algorithm inspired by the Rubik’s Cube. …”
    Get full text
    Article
  16. 136

    A Real-Time Image Encryption Method of Networked Inverted Pendulum Visual Servo Control System by Xue Li, Bing Liu, Changda Zhang

    Published 2020-01-01
    “…To solve the problem, a fast image encryption method by combining image scaling and improved self-diffusion image encryption (ISDIE) algorithm is firstly proposed, which is employed to encrypt the captured images after they are scaled. …”
    Get full text
    Article
  17. 137

    A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy by Nawal El Ghouate, Mohamed Amine Tahiri, Ahmed Bencherqui, Hanaa Mansouri, Ahmed El Maloufy, Hicham Karmouni, Mhamed Sayyouri, Sameh Askar, Mohamed Abouhawwash

    Published 2025-08-01
    “…We suggest a novel image encryption algorithm based on chaotic maps and the variable-step Josephus problem to get over these restrictions and increase the encryption resilience. …”
    Get full text
    Article
  18. 138

    Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes by Shamsa Kanwal, Saba Inam, Omar Cheikhrouhou, Kinza Mahnoor, Atef Zaguia, Habib Hamam

    Published 2021-01-01
    “…Thorough comparison with other image encryption algorithms is also carried out.…”
    Get full text
    Article
  19. 139

    Dynamical System in Chaotic Neurons with Time Delay Self-Feedback and Its Application in Color Image Encryption by Yao-Qun Xu, Xin-Xin Zhen, Meng Tang

    Published 2022-01-01
    “…In order to investigate the application of this model in image encryption, an image encryption scheme is proposed. …”
    Get full text
    Article
  20. 140

    An Image Encryption Scheme Using a 1D Chaotic Double Section Skew Tent Map by Rania A. Elmanfaloty, Ehab Abou-Bakr

    Published 2020-01-01
    “…To further elaborate on its robustness, a new image encryption algorithm incorporating the function as its random number generator is presented. …”
    Get full text
    Article