Search
Search Results
-
Medical image security and authenticity via dual encryption
Since medical images include sensitive patient information, security is the top priority during transmission. In addition to protecting patient data...
-
Audio block encryption using 3D chaotic system with adaptive parameter perturbation
To ensure the sensitive audio data transmit securely over the insecure internet, we proposed a chaos based dual-channel audio block encryption...
-
A dual image encryption method based on improved Henon map** and improved Logistic map**
In this paper, an improved two-dimensional Henon map** model and an improved one-dimensional Logistic map** model are designed. By analyzing the...
-
Don’t Tamper with Dual System Encryption
In related-key attacks (RKA), an attacker modifies a secret key stored in a device by tampering or fault injection and observes the evaluation output... -
Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA
Securing confidential data is imperative in the modern digital era, where the escalating challenges in data security underscore the urgency to...
-
An IoMT image crypto-system based on spatial watermarking and asymmetric encryption
In the growing field of the Internet of Medical Things (IoMT), securing the transmission of medical images over public networks is a critical...
-
Selective medical image encryption based on 3D Lorenz and Logistic system
Medical images contain very sensitive and confidential information about the patient and are huge in terms of size. Therefore, there is a need to...
-
Dual Security RGB Image Encryption Algorithm for Lightweight Cryptography
An efficacious mathematical cryptographic algorithm for three-plane RGB images based on an L-shaped fractal and a 1-D chaotic tent map is proposed.... -
Enhanced ubiquitous system architecture for securing healthcare IoT using efficient authentication and encryption
In the light of the ongoing development of IoT (Internet of Things) technology and the rise of Futuristic Smart Vertical Networks, its utilisation in...
-
A DCT-based robust and secured dual watermarking approach for color medical scans with joint permutation and diffusion encryption
Digital scans are extensively used in e-healthcare systems, necessitating increased authenticity and integrity of medical records due to security...
-
Fast image encryption based on new cascade chaotic system and Rubik’s cube strategy
The strength and effectiveness of a chaotic image cryptosystem are closely related to the complexity of the used chaotic maps. This paper first...
-
Image encryption-compression method via encryption based sparse decomposition
This paper proposes an image compression and encryption scheme based on sparse decomposition and chaotic system. The proposed approach contains three...
-
Advanced Encryption Standard (AES)-Based Text Encryption for Near Field Communication (NFC) Using Huffman Compression
Data encryption which is associated with cryptography is necessary to prevent the compromise of Personally Identifying. Multi-level security is...
-
Generic constructions of master-key KDM secure attribute-based encryption
Master-key key-dependent message (mKDM) security is a strong security notion for attribute-based encryption (ABE) schemes, which has been...
-
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain
Implementing a trust and secure immunity or vaccine passport verification system is now crucial for many countries. The system typically aims to...
-
A novel dual-layer security scheme based on 3-cell cellular neural network encryption and data hiding scheme for color images
The security of digital information is one of the significant problems of the existing world. In this work, we have proposed a dual-layer information...
-
Enhancing biometric authentication security through the novel integration of graph theory encryption and chaotic logistic map**
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric...
-
4D- dynamical system and convolution codes based colored image encryption scheme: information security perception
A novel color image encryption based on permutation and bit-wise exclusive OR (XOR) operation is introduced in this work. The main objective of the...
-
Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation
Nowadays, establishing security in data transmission is essential, and it is achieved by cryptography. Encryption of still or video images in...
-
Chao_SIFT based encryption approach to secure audio files in cloud computing
With the increasing usage of cloud computing in many fields, concerns about the secrecy of data storage in the cloud have been growing. Many types of...