-
141
A Mixed Chaotic Image Encryption Method Based on Parallel Rotation Scrambling in Rubik’s Cube Space
Published 2025-05-01“…Finally, the matrices of the R, G, and B channels are combined into an encrypted image. By performing the encryption algorithm in reverse, the encrypted image can be decrypted into the plain image. …”
Get full text
Article -
142
A Robust Image Encryption Scheme Based on Quantum Walks and Dynamic DNA for Secure Cloud Applications
Published 2025-01-01“…To enhance sensitivity to the plain image, our encryption algorithm initializes the hyperchaotic system with key parameters, generating chaotic sequences that are used to substitute the plain image. …”
Get full text
Article -
143
A Fast Image Encryption Scheme Based on a Four-Dimensional Variable-Parameter Hyperchaotic Map and Cyclic Shift Strategy
Published 2025-04-01“…Building upon this system, we design a fast image encryption algorithm that employs a cyclic shift strategy to continuously expand a small-scale random sequence, thereby generating the random numbers required for secure encryption. …”
Get full text
Article -
144
Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks
Published 2025-04-01“…While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. …”
Get full text
Article -
145
Separable reversible data hiding by vacating room after encryption using encrypted pixel difference
Published 2025-04-01“…It achieves an embedding rate of 1.2 bpp, significantly improving upon standard VRAE algorithms while allowing for lossless data extraction and image recovery. …”
Get full text
Article -
146
A New DNA Cryptosystem for Encrypting Persian Texts and Images with Key Exchange based on Hyper Elliptic Curve
Published 2025-08-01“…Also, considering the widespread use of images in public media, the ability to encrypt images is embedded in this scheme. …”
Get full text
Article -
147
Tamper detection, localization and self-recovery using slant transform with DNA encoding for medical images
Published 2025-09-01“…An eight-bit watermark is generated from the coefficients of the host image, which is further encrypted by DNA rules to improve the security of the watermarking scheme. …”
Get full text
Article -
148
Two-dimensional multi-scale permutation entropy algorithm based on uniform quantization
Published 2024-10-01“…The MUPE<sub>2D</sub> algorithm was used to investigate various synthetic textures, MIX<sub>2D </sub>(<italic>p</italic>) images and encrypted images. …”
Get full text
Article -
149
A novel approach for encryption and decryption of digital imaging and communications using mathematical modelling in internet of medical things
Published 2024-12-01“…Abstract This research introduces an innovative algorithm for the encryption and decryption of greyscale digital imaging and communications in medicine images utilizing Laplace transforms. …”
Get full text
Article -
150
A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding
Published 2025-05-01“…First, a novel one-dimensional discrete chaotic system (1D-LSCM) with complex chaotic behavior is introduced and extensively tested. Second, a new multi-image encryption algorithm based on the proposed 1D-LSCM and base64 encoding is presented. …”
Get full text
Article -
151
A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network
Published 2014-01-01“…A robust gray image encryption scheme using chaotic logistic map and artificial neural network (ANN) is introduced. …”
Get full text
Article -
152
HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system
Published 2023-12-01“…The work presented here is a high dimensional color image encryption architecture (HDIEA) founded on the Lorenz-Gauss-Logistic (LGL) encryption algorithm. …”
Get full text
Article -
153
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
Published 2023-12-01“… Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. …”
Get full text
Article -
154
A Secure COVID Affected CT Scan Image Encryption Scheme Using Hybrid MLSCM for IoMT Environment
Published 2025-01-01“…In this study, we presented an encryption system for COVID-19 CT images to address this problem. …”
Get full text
Article -
155
Introducing a novel 3D Chen-Rössler map for NTRU-based image encryption with OFDM transmission over a noisy channel
Published 2025-07-01“…In this paper, we propose an image encryption algorithm based on generating a new chaotic system exploited for image encryption using NTRU. …”
Get full text
Article -
156
Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption
Published 2020-01-01“…In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. …”
Get full text
Article -
157
A Novel Privacy Framework for Satellite Images Based on Theory of Chaos and Chess Pieces Castle and King
Published 2025-01-01“…These operations have been repeated at certain times to inject confusion effects in the suggested image encryption algorithm. The fifth and last stream of random numbers has been employed to introduce the requisite diffusion effects. …”
Get full text
Article -
158
MIE-SPD: A New and Highly Efficient Chaos-Based Multiple Image Encryption Technique With Synchronous Permutation Diffusion
Published 2025-01-01“…SPD involves evaluating diffusion and permutation processes at the same time. When encrypting, the colour image components are merged to build a single big image. …”
Get full text
Article -
159
Multimedia privacy protection: an N-round cascaded cryptosystem based on merged multi-chaotic maps under various image attacks
Published 2025-05-01Subjects: Get full text
Article -
160
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01“…First, edge recognition face detection technology is employed to detect facial features, with the corresponding matrix selected for encryption. The eigenvalues of the selected matrix are then extracted and hashed using the SHA-256 hash algorithm to enhance security, generating plain image associated chaotic sequences. …”
Get full text
Article