Showing 141 - 160 results of 271 for search '(image OR images) encryption algorithm', query time: 0.24s Refine Results
  1. 141

    A Mixed Chaotic Image Encryption Method Based on Parallel Rotation Scrambling in Rubik’s Cube Space by Lu Xu, Yun Chen, Yanlin Qin, Zhichao Yang

    Published 2025-05-01
    “…Finally, the matrices of the R, G, and B channels are combined into an encrypted image. By performing the encryption algorithm in reverse, the encrypted image can be decrypted into the plain image. …”
    Get full text
    Article
  2. 142

    A Robust Image Encryption Scheme Based on Quantum Walks and Dynamic DNA for Secure Cloud Applications by Ahmed A. Abd El-Latif, May Almousa, Bassem Abd-El-Atty

    Published 2025-01-01
    “…To enhance sensitivity to the plain image, our encryption algorithm initializes the hyperchaotic system with key parameters, generating chaotic sequences that are used to substitute the plain image. …”
    Get full text
    Article
  3. 143

    A Fast Image Encryption Scheme Based on a Four-Dimensional Variable-Parameter Hyperchaotic Map and Cyclic Shift Strategy by Guidong Zhang, Yanhao Zhao, Yanpei Zheng, Yulin Shen, Jun Huang

    Published 2025-04-01
    “…Building upon this system, we design a fast image encryption algorithm that employs a cyclic shift strategy to continuously expand a small-scale random sequence, thereby generating the random numbers required for secure encryption. …”
    Get full text
    Article
  4. 144

    Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks by Lijing Ren, Denghui Zhang

    Published 2025-04-01
    “…While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. …”
    Get full text
    Article
  5. 145

    Separable reversible data hiding by vacating room after encryption using encrypted pixel difference by Veeramuthu Venkatesh, R. Anushiadevi, Padmapriya Velupillai Meikandan, Hemalatha Mahalingam, Rengarajan Amirtharajan

    Published 2025-04-01
    “…It achieves an embedding rate of 1.2 bpp, significantly improving upon standard VRAE algorithms while allowing for lossless data extraction and image recovery. …”
    Get full text
    Article
  6. 146

    A New DNA Cryptosystem for Encrypting Persian Texts and Images with Key Exchange based on Hyper Elliptic Curve by Fatemeh Alidadi Shamsabadi, Shaghayegh Bakhtiari Chehelcheshmeh, Narges Farhadi

    Published 2025-08-01
    “…Also, considering the widespread use of images in public media, the ability to encrypt images is embedded in this scheme. …”
    Get full text
    Article
  7. 147

    Tamper detection, localization and self-recovery using slant transform with DNA encoding for medical images by Samudrala Jagadeesh, Ami Kumar Parida, K Meenakshi

    Published 2025-09-01
    “…An eight-bit watermark is generated from the coefficients of the host image, which is further encrypted by DNA rules to improve the security of the watermarking scheme. …”
    Get full text
    Article
  8. 148

    Two-dimensional multi-scale permutation entropy algorithm based on uniform quantization by WANG Daming, SHI Pengfei, LEI Yihang, BIAN Haoran, LIANG Min, CHANG Liwei

    Published 2024-10-01
    “…The MUPE<sub>2D</sub> algorithm was used to investigate various synthetic textures, MIX<sub>2D </sub>(<italic>p</italic>) images and encrypted images. …”
    Get full text
    Article
  9. 149

    A novel approach for encryption and decryption of digital imaging and communications using mathematical modelling in internet of medical things by S. Thalapathiraj, J. Arunnehru, V. C. Bharathi, R. Dhanasekar, L. Vijayaraja, R. Kannadasan, Muhammad Faheem, Arfat Ahmad Khan

    Published 2024-12-01
    “…Abstract This research introduces an innovative algorithm for the encryption and decryption of greyscale digital imaging and communications in medicine images utilizing Laplace transforms. …”
    Get full text
    Article
  10. 150

    A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding by Linqing Huang, Qingye Huang, Han Chen, Shuting Cai, Xiaoming Xiong, Jian Yang

    Published 2025-05-01
    “…First, a novel one-dimensional discrete chaotic system (1D-LSCM) with complex chaotic behavior is introduced and extensively tested. Second, a new multi-image encryption algorithm based on the proposed 1D-LSCM and base64 encoding is presented. …”
    Get full text
    Article
  11. 151

    A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network by Adelaïde Nicole Kengnou Telem, Colince Meli Segning, Godpromesse Kenne, Hilaire Bertrand Fotsin

    Published 2014-01-01
    “…A robust gray image encryption scheme using chaotic logistic map and artificial neural network (ANN) is introduced. …”
    Get full text
    Article
  12. 152

    HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system by Bharti Ahuja, Rajesh Doriya, Sharad Salunke, Mohammad Farukh Hashmi, Aditya Gupta, Neeraj Dhanraj Bokde

    Published 2023-12-01
    “…The work presented here is a high dimensional color image encryption architecture (HDIEA) founded on the Lorenz-Gauss-Logistic (LGL) encryption algorithm. …”
    Get full text
    Article
  13. 153

    Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach by Khalid Kadhim Jabbar, Fahmi Ghozzi, Ahmed Fakhfakh

    Published 2023-12-01
    “… Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. …”
    Get full text
    Article
  14. 154

    A Secure COVID Affected CT Scan Image Encryption Scheme Using Hybrid MLSCM for IoMT Environment by Sasmita Padhy, Sachikanta Dash, Naween Kumar, Gyanendra Kumar

    Published 2025-01-01
    “…In this study, we presented an encryption system for COVID-19 CT images to address this problem. …”
    Get full text
    Article
  15. 155

    Introducing a novel 3D Chen-Rössler map for NTRU-based image encryption with OFDM transmission over a noisy channel by Alain F. Djomo, Lee Mariel H. Yepdia, Yannick P. K. Nkandeu, Yannick A. Abanda, Alain Tiedeu

    Published 2025-07-01
    “…In this paper, we propose an image encryption algorithm based on generating a new chaotic system exploited for image encryption using NTRU. …”
    Get full text
    Article
  16. 156

    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption by Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li, Sichun Du

    Published 2020-01-01
    “…In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. …”
    Get full text
    Article
  17. 157

    A Novel Privacy Framework for Satellite Images Based on Theory of Chaos and Chess Pieces Castle and King by Nayef Alqahtani

    Published 2025-01-01
    “…These operations have been repeated at certain times to inject confusion effects in the suggested image encryption algorithm. The fifth and last stream of random numbers has been employed to introduce the requisite diffusion effects. …”
    Get full text
    Article
  18. 158

    MIE-SPD: A New and Highly Efficient Chaos-Based Multiple Image Encryption Technique With Synchronous Permutation Diffusion by Bibhudendra Acharya, Javvadi Venkata Sravan, Durga Ram Janaki Potnuru, K. Abhimanyu Kumar Patro

    Published 2025-01-01
    “…SPD involves evaluating diffusion and permutation processes at the same time. When encrypting, the colour image components are merged to build a single big image. …”
    Get full text
    Article
  19. 159
  20. 160

    Securing face images in UAV networks using chaos and DNA cryptography approach by Saba Inam, Shamsa Kanwal, Eaman Amin, Omar Cheikhrouhou, Monia Hamdi

    Published 2025-07-01
    “…First, edge recognition face detection technology is employed to detect facial features, with the corresponding matrix selected for encryption. The eigenvalues of the selected matrix are then extracted and hashed using the SHA-256 hash algorithm to enhance security, generating plain image associated chaotic sequences. …”
    Get full text
    Article