We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Fast chaotic encryption scheme based on separable moments and parallel computing

    In this paper, we propose three novel image encryption algorithms. Separable moments and parallel computing are combined in order to enhance the...

    Abdelhalim Kamrani, Khalid Zenkouar, ... Hakim El Fadili in Multimedia Tools and Applications
    Article 06 October 2023
  2. Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation

    Nowadays, establishing security in data transmission is essential, and it is achieved by cryptography. Encryption of still or video images in...

    Saeed Sharifian Moghimi Moghaddam, Vahid Rashtchi, Ali Azarpeyvand in The Journal of Supercomputing
    Article 10 January 2024
  3. A novel single kernel parallel image encryption scheme based on a chaotic map

    The development of communication technologies has increased concerns about data security, increasing the prominence of cryptography. Images are one...

    Joao Inacio Moreira Bezerra, Alexandre Molter, ... Vinícius Valduga de Almeida Camargo in Journal of Real-Time Image Processing
    Article 09 July 2024
  4. Image encryption algorithms based on two-dimensional discrete hyperchaotic systems and parallel compressive sensing

    In this paper, a new two-dimensional discrete hyperchaotic system is proposed. Verification using the phase-track map, bifurcation map and Lyapunov...

    Yuhui Gao, **gyi Liu, Shiqiang Chen in Multimedia Tools and Applications
    Article 15 December 2023
  5. Parallel multi-image encryption based on cross-plane DNA manipulation and a novel 2D chaotic system

    In this paper, we propose a novel parallel multi-image encryption algorithm based on cross-plane DNA operations. Firstly, a two-dimensional chaotic...

    Zhibo Zhang, **dong Zhang in The Visual Computer
    Article 07 February 2024
  6. A new fast image compression–encryption scheme based on compressive sensing and parallel blocks

    This paper proposes a new fast image compression–encryption scheme based on compressive sensing and parallel blocks. To reduce the encryption time in...

    A. Hadj Brahim, A. Ali Pacha, N. Hadj Said in The Journal of Supercomputing
    Article 26 December 2022
  7. An efficient meaningful double-image encryption algorithm based on parallel compressive sensing and FRFT embedding

    The transmission of images via the Internet has grown exponentially in the past few decades. However, the Internet considered as an insecure method...

    Donghua Jiang, Lidong Liu, ... **anwei Rong in Multimedia Tools and Applications
    Article 10 February 2023
  8. A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing

    Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control....
    Gong Wang, **anghan Zheng, ... Weipeng **e in Artificial Intelligence Security and Privacy
    Conference paper 2024
  9. An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications

    Image encryption algorithms based on Chaotic approach are becoming increasingly popular for remotely sensed images using parallel techniques. It has...

    Mahmoud Ahmad Al-Khasawneh, Irfan Uddin, ... Marwan Mahmoud in Cluster Computing
    Article 30 November 2021
  10. Attribute-based multiparty searchable encryption model for privacy protection of text data

    The problems of data storage and sharing have been well solved with cloud storage. However, the disadvantage is that users' messages are stored in...

    Shoulin Yin, Hang Li, ... Vania Vieira Estrela in Multimedia Tools and Applications
    Article 18 October 2023
  11. Image encryption techniques: A comprehensive review

    This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to...

    Hoshang Kolivand, Sabah Fadhel Hamood, ... Mohd Shafry Rahim in Multimedia Tools and Applications
    Article Open access 25 January 2024
  12. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform

    The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block...

    Tariq Shah, Tanveer ul Haq in The Journal of Supercomputing
    Article 07 July 2023
  13. Holographic encryption algorithm based on DNA coding and bit-plane decomposition

    In recent years, encryption algorithms have undergone rapid development, finding extensive applications across diverse industries. In the pursuit of...

    Zheng Liang, Li Chen, ... Yihua Hu in Multimedia Tools and Applications
    Article 15 March 2024
  14. High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform

    Authenticated encryption with associated data (AEAD) has become prominent over time because it offers authenticity and confidentiality...

    Jia-Lin Chan, Wai-Kong Lee, ... Bok-Min Goi in Cluster Computing
    Article 20 May 2024
  15. Homomorphic Encryption Library, Framework, Toolkit and Accelerator: A Review

    Homomorphic encryption ensures secure computation on encrypted data without the need for decryption beforehand. It enables the secure offloading of...

    Shalini Dhiman, Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in SN Computer Science
    Article 20 November 2023
  16. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing

    Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making...

    **aolong Zhao, Zhenjie Huang in Cluster Computing
    Article 06 May 2024
  17. Image encryption algorithm based on DNA network and hyperchaotic system

    This paper presents a novel deoxyribonucleic acid (DNA) network encryption method combined with a hyperchaotic system for image encryption. The DNA...

    **wei Yu, Kaiyu Peng, ... Wei **e in The Visual Computer
    Article 02 January 2024
  18. Simultaneous encryption and authentication of messages over GPUs

    There has recently been a rising interest in inventing new efficient cryptographic algorithms, thanks to advances in the field of Graphics Processing...

    Ahmed Fanfakh, Hassan Noura, Raphaël Couturier in Multimedia Tools and Applications
    Article 29 May 2023
  19. Quantum circuit implementations of lightweight authenticated encryption ASCON

    In this paper, we discuss the quantum circuit implementations of the lightweight authenticated encryption algorithm ASCON by using the NOT gates,...

    Yuanmeng Zheng, Qingbin Luo, ... Yi Lv in The Journal of Supercomputing
    Article 23 January 2024
  20. Finsler Encryption

    Inspired by previous work with the first example proposed at SecITC 2020, we give a general description of Finsler encryption that is based on a...
    Tetsuya Nagano, Hiroaki Anada in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
Did you find what you were looking for? Share feedback.