-
161
Research on Digital Image Watermarking Algorithm Based on Scrambling and Singular Value Decomposition
Published 2022-01-01“…At present, the digital image watermarking algorithm has not embedded the synchronization signal in the image, resulting in the poor performance of the embedded image in terms of, for example, imperceptibility, anti-attack ability, and robustness. …”
Get full text
Article -
162
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
Published 2022-08-01“…Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). …”
Get full text
Article -
163
High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
Published 2023-09-01“…To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly, the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the (3,4) and (3,5) threshold, the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability, but also obtain a better embedding capacity.Meanwhile, the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.…”
Get full text
Article -
164
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
Published 2025-02-01“…The efficiency of the developed medical image encryption algorithm is tested against various attack analyses. …”
Get full text
Article -
165
Applying TTIED-CMYK Algorithm in Wireless Sensor Networks Based on Raspberry pi and DHT-11
Published 2022-09-01Subjects: “…Text-to-Image Encryption (TTIE)…”
Get full text
Article -
166
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Published 2025-03-01“…This paper addresses the problem of protecting sensitive medical images during transmission by proposing a robust, lightweight encryption scheme. …”
Get full text
Article -
167
Securing digital images: A chaos-driven scrambling algorithm using the Rössler system.
Published 2025-01-01“…Among these, image encryption based on scrambling algorithms has been extensively utilized. …”
Get full text
Article -
168
Color image encryption method based on four-dimensional multi-scroll multi-wing hyperchaotic system and DNA mutation mechanism
Published 2025-07-01“…However, traditional low-dimensional chaotic systems often suffer from limited complexity and predictability, making them insufficient for high-security image encryption applications. To enhance the practicality and security of chaotic systems in the field of image encryption, this paper proposes a novel four-dimensional multi-scroll multi-wing hyperchaotic system and a corresponding color image encryption algorithm incorporating a DNA mutation mechanism. …”
Get full text
Article -
169
A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain
Published 2021-01-01“…A new asymmetric optical double image encryption algorithm is proposed, which combines phase truncation and singular value decomposition. …”
Get full text
Article -
170
Information Encryption Algorithm Using a Discrete Quantum Map
Published 2025-07-01“…To evaluate the performance of the algorithm, testing was carried out on three encrypted images that differed in the volume of transmitted information. …”
Get full text
Article -
171
Facial Expression Recognition and Digital Images Infosecurity for Prevention Care System Application in Sudden Infant Death Syndrome Monitoring
Published 2025-01-01Subjects: Get full text
Article -
172
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…This research paper investigates the efficiency of cryptographic algorithms within graph-based encryption models such as star graph, focusing on their computational performance and security robustness. …”
Get full text
Article -
173
Multi-Channel Multi-Protocol Quantum Key Distribution System for Secure Image Transmission in Healthcare
Published 2025-01-01“…Quantum key distribution (QKD) is a viable technique for safeguarding image transmission against numerous attacks. To address the limitations of existing methods in securing electronic medical records, we have explored an encryption technique using a set of real-time medical images along with existing standard images using QKD protocols including BB84 (Bennett-Brassard 1984), CASCADE (Cascading Error Correction Algorithm for Data Exchange), and differential-phase-shift (DPS) under the fiber-based (OFC) and free-space (FSO) channels. …”
Get full text
Article -
174
Multimodal Medical Image Protection Algorithm Based on Genetic Coding and Coupled Hyperchaotic Mapping
Published 2025-05-01“…[Methods] In the stage of chaotic sequence generation, the CMC-CTBCS coupling model was proposed, and the three-dimensional Sine-ICMIC cascade mapping (3D-SICM) was constructed with Sine mapping (Sine) and iterative chaotic map with infinite collapses (ICMIC) as seed mapping, which was applied for the design of multimodal medical image encryption. The stage of image encryption mainly included three parts: multimodal medical image fusion algorithm, zero watermarking authentication algorithm based on edge detection, and genetic coding selection encryption algorithm. …”
Get full text
Article -
175
Verifiable secure image retrieval for cloud-assisted IoT environments
Published 2025-03-01“…A matrix-based approach was employed for indexing and querying, and the feature matrix was encrypted using an enhanced secure k-nearest neighbor (kNN) algorithm based on the learning with errors (LWE), ensuring improved security in indexing and querying. …”
Get full text
Article -
176
Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
Published 2020-01-01“…In infosecurity considerations, digital signature and encryption of individual anamnesis plain images should prevent data from being stolen, tampered, or peeked by unauthorized people. …”
Get full text
Article -
177
Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm
Published 2021-06-01Get full text
Article -
178
Advancement of the DRPE Encryption Algorithm for Phase CGHs by Random Pixel Shuffling
Published 2025-04-01“…This work presents an optical encryption process for various types of information related to 3D worlds (scenes) or 2D images, utilizing Computer-Generated Holograms (CGHs). …”
Get full text
Article -
179
Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
Published 2023-01-01“…This paper suggests a novel image encryption and decryption technique based on a computational genetic approach and self-adaptive chaotic substitution. …”
Get full text
Article -
180
A novel 2D MTMHM based key generation for enhanced security in medical image communication
Published 2025-07-01“…The generated random key sequences trigger the proposed medical image encryption algorithm, which integrates a shuffling-diffusion process. …”
Get full text
Article