We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,873 results
  1. Medical image security and authenticity via dual encryption

    Since medical images include sensitive patient information, security is the top priority during transmission. In addition to protecting patient data...

    Kishore Babu Nampalle, Shriansh Manhas, Balasubramanian Raman in Applied Intelligence
    Article 19 April 2023
  2. Audio block encryption using 3D chaotic system with adaptive parameter perturbation

    To ensure the sensitive audio data transmit securely over the insecure internet, we proposed a chaos based dual-channel audio block encryption...

    Article 13 March 2023
  3. A dual image encryption method based on improved Henon map** and improved Logistic map**

    In this paper, an improved two-dimensional Henon map** model and an improved one-dimensional Logistic map** model are designed. By analyzing the...

    Shiming Niu, Ru Xue, Cong Ding in Multimedia Tools and Applications
    Article 03 May 2024
  4. Don’t Tamper with Dual System Encryption

    In related-key attacks (RKA), an attacker modifies a secret key stored in a device by tampering or fault injection and observes the evaluation output...
    Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow in Applied Cryptography and Network Security
    Conference paper 2022
  5. Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA

    Securing confidential data is imperative in the modern digital era, where the escalating challenges in data security underscore the urgency to...

    Zeena N. Al-Kateeb, Melad Jader in Multimedia Tools and Applications
    Article 11 April 2024
  6. An IoMT image crypto-system based on spatial watermarking and asymmetric encryption

    In the growing field of the Internet of Medical Things (IoMT), securing the transmission of medical images over public networks is a critical...

    Mohammed El Habib Kahla, Mounir Beggas, ... Mohammad Hammoudeh in Multimedia Tools and Applications
    Article 25 June 2024
  7. Selective medical image encryption based on 3D Lorenz and Logistic system

    Medical images contain very sensitive and confidential information about the patient and are huge in terms of size. Therefore, there is a need to...

    Munazah Lyle, Parsa Sarosh, Shabir A. Parah in Multimedia Tools and Applications
    Article 24 October 2023
  8. Dual Security RGB Image Encryption Algorithm for Lightweight Cryptography

    An efficacious mathematical cryptographic algorithm for three-plane RGB images based on an L-shaped fractal and a 1-D chaotic tent map is proposed....
    Vrushali Khaladkar, Manish Kumar in Advancements in Smart Computing and Information Security
    Conference paper 2024
  9. Enhanced ubiquitous system architecture for securing healthcare IoT using efficient authentication and encryption

    In the light of the ongoing development of IoT (Internet of Things) technology and the rise of Futuristic Smart Vertical Networks, its utilisation in...

    Chaitanya Shrikant Kulkarni, Makarand Y. Naniwadekar, ... Haewon Byeon in International Journal of Data Science and Analytics
    Article 02 January 2024
  10. A DCT-based robust and secured dual watermarking approach for color medical scans with joint permutation and diffusion encryption

    Digital scans are extensively used in e-healthcare systems, necessitating increased authenticity and integrity of medical records due to security...

    Sajeer M, Ashutosh Mishra in Multimedia Tools and Applications
    Article 17 October 2023
  11. Fast image encryption based on new cascade chaotic system and Rubik’s cube strategy

    The strength and effectiveness of a chaotic image cryptosystem are closely related to the complexity of the used chaotic maps. This paper first...

    Hongxiang Zhao, Shucui **e, Jianzhong Zhang in Multimedia Tools and Applications
    Article 24 October 2023
  12. Image encryption-compression method via encryption based sparse decomposition

    This paper proposes an image compression and encryption scheme based on sparse decomposition and chaotic system. The proposed approach contains three...

    Aboozar Ghaffari in Multimedia Tools and Applications
    Article 26 July 2023
  13. Advanced Encryption Standard (AES)-Based Text Encryption for Near Field Communication (NFC) Using Huffman Compression

    Data encryption which is associated with cryptography is necessary to prevent the compromise of Personally Identifying. Multi-level security is...

    Sunday Adeola Ajagbe, Oluwashola David Adeniji, ... Seun Femi Abiona in SN Computer Science
    Article 06 January 2024
  14. Generic constructions of master-key KDM secure attribute-based encryption

    Master-key key-dependent message (mKDM) security is a strong security notion for attribute-based encryption (ABE) schemes, which has been...

    Jiaxin Pan, Chen Qian, Benedikt Wagner in Designs, Codes and Cryptography
    Article 09 September 2023
  15. An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain

    Implementing a trust and secure immunity or vaccine passport verification system is now crucial for many countries. The system typically aims to...

    Somchart Fugkeaw in Journal of Cloud Computing
    Article Open access 02 August 2023
  16. A novel dual-layer security scheme based on 3-cell cellular neural network encryption and data hiding scheme for color images

    The security of digital information is one of the significant problems of the existing world. In this work, we have proposed a dual-layer information...

    Lal Said, Ammar S. Alanazi, Majid Khan in Multimedia Tools and Applications
    Article 04 August 2022
  17. Enhancing biometric authentication security through the novel integration of graph theory encryption and chaotic logistic map**

    The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric...

    Walid El-Shafai, A. El-Mesady, F. M. Kamal in Multimedia Tools and Applications
    Article 02 July 2024
  18. 4D- dynamical system and convolution codes based colored image encryption scheme: information security perception

    A novel color image encryption based on permutation and bit-wise exclusive OR (XOR) operation is introduced in this work. The main objective of the...

    Dania Saleem Malik, Tariq Shah in Multimedia Tools and Applications
    Article 12 September 2023
  19. Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation

    Nowadays, establishing security in data transmission is essential, and it is achieved by cryptography. Encryption of still or video images in...

    Saeed Sharifian Moghimi Moghaddam, Vahid Rashtchi, Ali Azarpeyvand in The Journal of Supercomputing
    Article 10 January 2024
  20. Chao_SIFT based encryption approach to secure audio files in cloud computing

    With the increasing usage of cloud computing in many fields, concerns about the secrecy of data storage in the cloud have been growing. Many types of...

    Saja J. Mohammed, Zeena N. Al-Kateeb in Multimedia Tools and Applications
    Article 05 June 2024
Did you find what you were looking for? Share feedback.