Showing 161 - 180 results of 271 for search '(image OR images) encryption algorithm', query time: 0.17s Refine Results
  1. 161

    Research on Digital Image Watermarking Algorithm Based on Scrambling and Singular Value Decomposition by Lei Pei

    Published 2022-01-01
    “…At present, the digital image watermarking algorithm has not embedded the synchronization signal in the image, resulting in the poor performance of the embedded image in terms of, for example, imperceptibility, anti-attack ability, and robustness. …”
    Get full text
    Article
  2. 162

    A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation by Mustafa Dhiaa Al-Hassani

    Published 2022-08-01
    “…Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). …”
    Get full text
    Article
  3. 163

    High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing by Minqing ZHANG, Chao JIANG, Fuqiang DI, Zongbao JIANG, Xiong ZHANG

    Published 2023-09-01
    “…To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly, the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the (3,4) and (3,5) threshold, the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability, but also obtain a better embedding capacity.Meanwhile, the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.…”
    Get full text
    Article
  4. 164
  5. 165
  6. 166

    Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs by Siva Janakiraman, Vinoth Raj R, R. Sivaraman, A. Sridevi, Har Narayan Upadhyay, Rengarajan Amirtharajan

    Published 2025-03-01
    “…This paper addresses the problem of protecting sensitive medical images during transmission by proposing a robust, lightweight encryption scheme. …”
    Get full text
    Article
  7. 167
  8. 168

    Color image encryption method based on four-dimensional multi-scroll multi-wing hyperchaotic system and DNA mutation mechanism by Qi Peng, Kun Zhang, Bing Zheng, Hao Ning, Yu Zhou, Xin Xie

    Published 2025-07-01
    “…However, traditional low-dimensional chaotic systems often suffer from limited complexity and predictability, making them insufficient for high-security image encryption applications. To enhance the practicality and security of chaotic systems in the field of image encryption, this paper proposes a novel four-dimensional multi-scroll multi-wing hyperchaotic system and a corresponding color image encryption algorithm incorporating a DNA mutation mechanism. …”
    Get full text
    Article
  9. 169

    A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain by Anshula Sangwan, Hukum Singh

    Published 2021-01-01
    “…A new asymmetric optical double image encryption algorithm is proposed, which combines phase truncation and singular value decomposition. …”
    Get full text
    Article
  10. 170

    Information Encryption Algorithm Using a Discrete Quantum Map by A. V. Sidorenko, E. A. Vysotskaya

    Published 2025-07-01
    “…To evaluate the performance of the algorithm, testing was carried out on three encrypted images that differed in the volume of transmitted information. …”
    Get full text
    Article
  11. 171
  12. 172

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…This research paper investigates the efficiency of cryptographic algorithms within graph-based encryption models such as star graph, focusing on their computational performance and security robustness. …”
    Get full text
    Article
  13. 173

    Multi-Channel Multi-Protocol Quantum Key Distribution System for Secure Image Transmission in Healthcare by Bandana Mallick, Priyadarsan Parida, Chittaranjan Nayak, Tarek Khalifa, Manoj Kumar Panda, Nawaf Ali, Gajanan Uttam Patil, Bibhu Prasad

    Published 2025-01-01
    “…Quantum key distribution (QKD) is a viable technique for safeguarding image transmission against numerous attacks. To address the limitations of existing methods in securing electronic medical records, we have explored an encryption technique using a set of real-time medical images along with existing standard images using QKD protocols including BB84 (Bennett-Brassard 1984), CASCADE (Cascading Error Correction Algorithm for Data Exchange), and differential-phase-shift (DPS) under the fiber-based (OFC) and free-space (FSO) channels. …”
    Get full text
    Article
  14. 174

    Multimodal Medical Image Protection Algorithm Based on Genetic Coding and Coupled Hyperchaotic Mapping by CHANG Ruiyun, FENG Xiufang, ZHANG Hao

    Published 2025-05-01
    “…[Methods] In the stage of chaotic sequence generation, the CMC-CTBCS coupling model was proposed, and the three-dimensional Sine-ICMIC cascade mapping (3D-SICM) was constructed with Sine mapping (Sine) and iterative chaotic map with infinite collapses (ICMIC) as seed mapping, which was applied for the design of multimodal medical image encryption. The stage of image encryption mainly included three parts: multimodal medical image fusion algorithm, zero watermarking authentication algorithm based on edge detection, and genetic coding selection encryption algorithm. …”
    Get full text
    Article
  15. 175

    Verifiable secure image retrieval for cloud-assisted IoT environments by GUO Jiaqi, MA Zhi, WANG Wensheng, TIAN Cong, DUAN Zhenhua

    Published 2025-03-01
    “…A matrix-based approach was employed for indexing and querying, and the feature matrix was encrypted using an enhanced secure k-nearest neighbor (kNN) algorithm based on the learning with errors (LWE), ensuring improved security in indexing and querying. …”
    Get full text
    Article
  16. 176

    Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image by Pi-Yun Chen, Jian-Xing Wu, Chien-Ming Li, Chao-Lin Kuo, Neng-Sheng Pai, Chia-Hung Lin

    Published 2020-01-01
    “…In infosecurity considerations, digital signature and encryption of individual anamnesis plain images should prevent data from being stolen, tampered, or peeked by unauthorized people. …”
    Get full text
    Article
  17. 177
  18. 178

    Advancement of the DRPE Encryption Algorithm for Phase CGHs by Random Pixel Shuffling by Alfonso Blesa, Francisco J. Serón

    Published 2025-04-01
    “…This work presents an optical encryption process for various types of information related to 3D worlds (scenes) or 2D images, utilizing Computer-Generated Holograms (CGHs). …”
    Get full text
    Article
  19. 179

    Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution by Nawal Shaltout, Ahmed A.Abd El-Latif, Waleed M. Al-Adrousy, Samir Elmougy

    Published 2023-01-01
    “…This paper suggests a novel image encryption and decryption technique based on a computational genetic approach and self-adaptive chaotic substitution. …”
    Get full text
    Article
  20. 180

    A novel 2D MTMHM based key generation for enhanced security in medical image communication by C. Sivaranjani Devi, Rengarajan Amirtharajan

    Published 2025-07-01
    “…The generated random key sequences trigger the proposed medical image encryption algorithm, which integrates a shuffling-diffusion process. …”
    Get full text
    Article