Search
Search Results
-
Selective medical image encryption based on 3D Lorenz and Logistic system
Medical images contain very sensitive and confidential information about the patient and are huge in terms of size. Therefore, there is a need to...
-
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might...
-
A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map
Modern medical examinations have produced a large number of medical images. It is a great challenge to transmit and store them quickly and securely....
-
A fast selective encryption scheme for H.264/AVC video with syntax-preserving and zero bit rate expansion
H.264/AVC is the most widely used video-coding standard today, and designing selective encryption (SE) algorithms for H.264/AVC has drawn extensive...
-
Selective Encryption for Owners’ Control in Digital Data Markets
A recent solution for permitting data owners to make their data selectively available on digital market platforms combines the adoption of selective... -
Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network
In the last few years, the volume of internet traffic has increased enormously. A significant portion of the internet traffic is constituted by...
-
Image encryption techniques: A comprehensive review
This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to...
-
Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding
With the increasing need for privacy-preserving, data hiding in encrypted images has attracted more attention in the data hiding area. The existing...
-
Domain-flexible selective image encryption based on genetic operations and chaotic maps
Image encryption research has seen massive advances in recent times, but many avenues of improvement still remain nascent. This paper takes head on...
-
Receiver selective opening security for identity-based encryption in the multi-challenge setting
Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has...
-
Fault-tolerant identity-based encryption from SM9
This paper initiates the formal study of attribute-based encryption within the framework of SM9, the Chinese National Cryptography Standard for...
-
On the security of functional encryption in the generic group model
In the context of functional encryption (FE), a weak security notion called selective security , which enforces the adversary to complete a challenge...
-
(Inner-Product) Functional Encryption with Updatable Ciphertexts
We propose a novel variant of functional encryption which supports ciphertext updates, dubbed ciphertext-updatable functional encryption. Such a...
-
Multi-modal text recognition and encryption in scanned document images
Many military and business documents such as memorandums, invoices, medical records and bills among others are transmitted over the network in the...
-
Robust image encryption algorithm in dwt domain
Over the past few years, the use of chaotic maps have surfaced to become an important topic in the field of image encryption. The majority of...
-
A novel image encryption algorithm based on new one-dimensional chaos and DNA coding
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The...
-
A fast image encryption algorithm with variable key space
The security of images is of great importance given the current development of Internet technology. The existing encryption algorithms have some...
-
Image encryption scheme based on double permutation and DNA
This paper mainly contributes a bit-level and pixel-level double-permutation image encryption scheme based on DNA coding technology, which can...
-
An IoMT image crypto-system based on spatial watermarking and asymmetric encryption
In the growing field of the Internet of Medical Things (IoMT), securing the transmission of medical images over public networks is a critical...
-
Lattice-based autonomous path proxy re-encryption in the standard model
Autonomous path proxy re-encryption (AP-PRE) is a type of PRE that implements control on the delegation path in a multi-hop PRE. AP-PRE forces the...