We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,868 results
  1. Selective medical image encryption based on 3D Lorenz and Logistic system

    Medical images contain very sensitive and confidential information about the patient and are huge in terms of size. Therefore, there is a need to...

    Munazah Lyle, Parsa Sarosh, Shabir A. Parah in Multimedia Tools and Applications
    Article 24 October 2023
  2. Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives

    With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might...

    Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso in Designs, Codes and Cryptography
    Article 20 January 2024
  3. A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map

    Modern medical examinations have produced a large number of medical images. It is a great challenge to transmit and store them quickly and securely....

    Bin Zhang, Bahbibi Rahmatullah, ... Zhaoyan Liu in Multimedia Tools and Applications
    Article 23 September 2022
  4. A fast selective encryption scheme for H.264/AVC video with syntax-preserving and zero bit rate expansion

    H.264/AVC is the most widely used video-coding standard today, and designing selective encryption (SE) algorithms for H.264/AVC has drawn extensive...

    Qingxin Sheng, Chong Fu, ... Chiu-Wing Sham in Signal, Image and Video Processing
    Article 25 October 2023
  5. Selective Encryption for Owners’ Control in Digital Data Markets

    A recent solution for permitting data owners to make their data selectively available on digital market platforms combines the adoption of selective...
    Sara Foresti, Giovanni Livraga in E-Business and Telecommunications
    Conference paper 2023
  6. Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network

    In the last few years, the volume of internet traffic has increased enormously. A significant portion of the internet traffic is constituted by...

    Vijaya Murari T., Ravishankar K C, Raghu M E in Multimedia Tools and Applications
    Article 13 March 2024
  7. Image encryption techniques: A comprehensive review

    This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to...

    Hoshang Kolivand, Sabah Fadhel Hamood, ... Mohd Shafry Rahim in Multimedia Tools and Applications
    Article Open access 25 January 2024
  8. Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding

    With the increasing need for privacy-preserving, data hiding in encrypted images has attracted more attention in the data hiding area. The existing...

    Sisheng Chen, Chin-Chen Chang in Multimedia Tools and Applications
    Article 19 April 2022
  9. Domain-flexible selective image encryption based on genetic operations and chaotic maps

    Image encryption research has seen massive advances in recent times, but many avenues of improvement still remain nascent. This paper takes head on...

    P. Murali, G. Niranjana, ... Joan S. Muthu in The Visual Computer
    Article 17 February 2022
  10. Receiver selective opening security for identity-based encryption in the multi-challenge setting

    Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has...

    Zhengan Huang, Junzuo Lai, ... **n Mu in Designs, Codes and Cryptography
    Article 17 November 2022
  11. Fault-tolerant identity-based encryption from SM9

    This paper initiates the formal study of attribute-based encryption within the framework of SM9, the Chinese National Cryptography Standard for...

    **aohong Liu, **nyi Huang, ... Wei Wu in Science China Information Sciences
    Article 22 January 2024
  12. On the security of functional encryption in the generic group model

    In the context of functional encryption (FE), a weak security notion called selective security , which enforces the adversary to complete a challenge...

    Hyung Tae Lee, Jae Hong Seo in Designs, Codes and Cryptography
    Article 27 May 2023
  13. (Inner-Product) Functional Encryption with Updatable Ciphertexts

    We propose a novel variant of functional encryption which supports ciphertext updates, dubbed ciphertext-updatable functional encryption. Such a...

    Valerio Cini, Sebastian Ramacher, ... Erkan Tairi in Journal of Cryptology
    Article Open access 15 December 2023
  14. Multi-modal text recognition and encryption in scanned document images

    Many military and business documents such as memorandums, invoices, medical records and bills among others are transmitted over the network in the...

    Maemoona Kayani, Abdul Ghafoor, M. Mohsin Riaz in The Journal of Supercomputing
    Article 09 December 2022
  15. Robust image encryption algorithm in dwt domain

    Over the past few years, the use of chaotic maps have surfaced to become an important topic in the field of image encryption. The majority of...

    Rajwinder Kaur, Butta Singh in Multimedia Tools and Applications
    Article 07 October 2023
  16. A novel image encryption algorithm based on new one-dimensional chaos and DNA coding

    This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The...

    Sijia Feng, Maochang Zhao, ... Yuanyu Li in Multimedia Tools and Applications
    Article 15 April 2024
  17. A fast image encryption algorithm with variable key space

    The security of images is of great importance given the current development of Internet technology. The existing encryption algorithms have some...

    Sun **yu, Chen Zhong in Multimedia Tools and Applications
    Article 29 September 2023
  18. Image encryption scheme based on double permutation and DNA

    This paper mainly contributes a bit-level and pixel-level double-permutation image encryption scheme based on DNA coding technology, which can...

    Xuncai Zhang, Jiali Di, Ying Niu in Multimedia Tools and Applications
    Article 18 December 2023
  19. An IoMT image crypto-system based on spatial watermarking and asymmetric encryption

    In the growing field of the Internet of Medical Things (IoMT), securing the transmission of medical images over public networks is a critical...

    Mohammed El Habib Kahla, Mounir Beggas, ... Mohammad Hammoudeh in Multimedia Tools and Applications
    Article 25 June 2024
  20. Lattice-based autonomous path proxy re-encryption in the standard model

    Autonomous path proxy re-encryption (AP-PRE) is a type of PRE that implements control on the delegation path in a multi-hop PRE. AP-PRE forces the...

    Wenli **e, Jian Weng, ... Feixiang Zhao in Science China Information Sciences
    Article 23 May 2023
Did you find what you were looking for? Share feedback.