Search
Search Results
-
A new three-dimensional memristor chaotic circuit design and its application in image encryption
In recent years, memristors have received widespread attention due to their inherent nonlinear characteristics. To this end, a three-dimensional...
-
EVAD: encrypted vibrational anomaly detection with homomorphic encryption
One of the main concerns of cloud-based services based on machine and deep learning algorithms is the privacy of users’ data. This is particularly...
-
An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding
Image encryption algorithm based on chaos has been widely used in various industries, but many image encryption algorithms based on low-dimensional...
-
Candidate iO from Homomorphic Encryption Schemes
We propose a new approach to construct general-purpose indistinguishability obfuscation (iO). Our construction is obtained via a new intermediate...
-
A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing
Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks,...
-
A hybrid authenticated image encryption scheme using elliptic curves for enhanced security
The rapid evolution of digital technology has heightened concerns about the security of multimedia communication across vulnerable platforms. In...
-
A hybrid encryption model for the hyperspectral images: application to hyperspectral medical images
Hyperspectral images collect information across the electromagnetic spectrum and are widely used to recognize signals, identify materials, and find...
-
Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
Cloud-based data sharing addresses the limited storage availability problem for resource-constrained users albeit at the cost of privacy and the need...
-
Double-image coupling encryption algorithm based on TLCS and misplacement diffusion
A new double-image coupling encryption algorithm based on TLCS and misplacement diffusion is proposed. This paper proposes a new one-dimensional...
-
Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system
Reversible Data Hiding in Encryption Domain (RDHED) can be used in different areas such as secure remote sensing or telemedicine. Since data...
-
Three-channel robust optical encryption via engineering coherence Stokes vector of partially coherent light
Optical encryption strategies utilizing fully coherent light have been widely explored but often face challenges such as speckle noise and beam...
-
A data compression and encryption method for green edge computing
Green edge computing aims to reasonably allocate computing resources on the premise of ensuring the reliability of information services. The...
-
Optimizing the SM4 Encryption Algorithm for Blockchain Security
Encryption algorithms play a critical role in ensuring data security. However, challenges such as slow operation and suboptimal efficiency arise... -
Encryption of medical data based on blockchain and multi-chaotic maps
In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and...
-
Efficient Neuroimaging Data Security and Encryption Using Pixel-Based Homomorphic Residue Number System
In recent times, there has been an increasing attention in designing a homomorphic privacy-preserving classification method for neuro-images based on...
-
A hybrid scheme using hyper-chaotic system and elliptic curve cryptography for image encryption
This paper offers an efficient hybrid image encryption algorithm based on an elliptic curve cryptography (ECC), skew tent map and hyperchaotic system...
-
A novel four image encryption approach in sparse domain based on biometric keys
In this paper, a novel four-image encryption method using biometric keys based on a compressive phase retrieval algorithm is proposed. In the...
-
Latin Square and Machine Learning Techniques Combined Algorithm for Image Encryption
Multimedia data is crucial in the military, medical, forensics, social, etc., to transmit a large amount of data. Security of this sensitive...
-
An encryption technique based on bilateral chaotic systems and fuzzy symbol encoding
Encryption techniques have been proposed to improve security using chaos theory, mathematical computations, DNA computations, substitution-masking...
-
Angular momentum holography via a minimalist metasurface for optical nested encryption
Metasurfaces can perform high-performance multi-functional integration by manipulating the abundant physical dimensions of light, demonstrating great...