We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Fast chaotic encryption scheme based on separable moments and parallel computing

    In this paper, we propose three novel image encryption algorithms. Separable moments and parallel computing are combined in order to enhance the...

    Abdelhalim Kamrani, Khalid Zenkouar, ... Hakim El Fadili in Multimedia Tools and Applications
    Article 06 October 2023
  2. Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation

    Nowadays, establishing security in data transmission is essential, and it is achieved by cryptography. Encryption of still or video images in...

    Saeed Sharifian Moghimi Moghaddam, Vahid Rashtchi, Ali Azarpeyvand in The Journal of Supercomputing
    Article 10 January 2024
  3. A novel single kernel parallel image encryption scheme based on a chaotic map

    The development of communication technologies has increased concerns about data security, increasing the prominence of cryptography. Images are one...

    Joao Inacio Moreira Bezerra, Alexandre Molter, ... Vinícius Valduga de Almeida Camargo in Journal of Real-Time Image Processing
    Article 09 July 2024
  4. Image encryption algorithms based on two-dimensional discrete hyperchaotic systems and parallel compressive sensing

    In this paper, a new two-dimensional discrete hyperchaotic system is proposed. Verification using the phase-track map, bifurcation map and Lyapunov...

    Yuhui Gao, **gyi Liu, Shiqiang Chen in Multimedia Tools and Applications
    Article 15 December 2023
  5. Parallel multi-image encryption based on cross-plane DNA manipulation and a novel 2D chaotic system

    In this paper, we propose a novel parallel multi-image encryption algorithm based on cross-plane DNA operations. Firstly, a two-dimensional chaotic...

    Zhibo Zhang, **dong Zhang in The Visual Computer
    Article 07 February 2024
  6. Triple-image visually secure encryption scheme based on newly designed chaotic map and parallel compressive sensing

    This paper proposes a novel triple-image visually secure encryption algorithm based on a newly designed chaotic map and parallel compressive sensing...

    **aoli Wang, Lin Teng, ... **ngyuan Wang in The European Physical Journal Plus
    Article 16 February 2023
  7. A new fast image compression–encryption scheme based on compressive sensing and parallel blocks

    This paper proposes a new fast image compression–encryption scheme based on compressive sensing and parallel blocks. To reduce the encryption time in...

    A. Hadj Brahim, A. Ali Pacha, N. Hadj Said in The Journal of Supercomputing
    Article 26 December 2022
  8. An efficient meaningful double-image encryption algorithm based on parallel compressive sensing and FRFT embedding

    The transmission of images via the Internet has grown exponentially in the past few decades. However, the Internet considered as an insecure method...

    Donghua Jiang, Lidong Liu, ... **anwei Rong in Multimedia Tools and Applications
    Article 10 February 2023
  9. A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing

    Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control....
    Gong Wang, **anghan Zheng, ... Weipeng **e in Artificial Intelligence Security and Privacy
    Conference paper 2024
  10. High-dimensional Poincaré beams generated through cascaded metasurfaces for high-security optical encryption

    Optical encryption plays an increasingly important role in the field of information security owing to its parallel processing capability and low...

    Jitao Ji, Chen Chen, ... Tao Li in PhotoniX
    Article Open access 17 April 2024
  11. An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications

    Image encryption algorithms based on Chaotic approach are becoming increasingly popular for remotely sensed images using parallel techniques. It has...

    Mahmoud Ahmad Al-Khasawneh, Irfan Uddin, ... Marwan Mahmoud in Cluster Computing
    Article 30 November 2021
  12. Attribute-based multiparty searchable encryption model for privacy protection of text data

    The problems of data storage and sharing have been well solved with cloud storage. However, the disadvantage is that users' messages are stored in...

    Shoulin Yin, Hang Li, ... Vania Vieira Estrela in Multimedia Tools and Applications
    Article 18 October 2023
  13. Image encryption techniques: A comprehensive review

    This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to...

    Hoshang Kolivand, Sabah Fadhel Hamood, ... Mohd Shafry Rahim in Multimedia Tools and Applications
    Article Open access 25 January 2024
  14. Dual-layer optical encryption fluorescent polymer waveguide chip based on optical pulse-code modulation technique

    Information encryption technique has broad applications in individual privacy, military confidentiality, and national security, but traditional...

    Chunxue Wang, Daming Zhang, ... Teng Fei in Nature Communications
    Article Open access 29 July 2023
  15. Partial-privacy image encryption algorithm based on time-varying delayed exponentially controlled chaotic system

    To enhance privacy protection for specific regions within an image while preserving its overall visual integrity, this paper presents a visual...

    Jie Wang, Ru Zhang, Jianyi Liu in Nonlinear Dynamics
    Article 06 May 2024
  16. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform

    The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block...

    Tariq Shah, Tanveer ul Haq in The Journal of Supercomputing
    Article 07 July 2023
  17. Holographic encryption algorithm based on DNA coding and bit-plane decomposition

    In recent years, encryption algorithms have undergone rapid development, finding extensive applications across diverse industries. In the pursuit of...

    Zheng Liang, Li Chen, ... Yihua Hu in Multimedia Tools and Applications
    Article 15 March 2024
  18. High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform

    Authenticated encryption with associated data (AEAD) has become prominent over time because it offers authenticity and confidentiality...

    Jia-Lin Chan, Wai-Kong Lee, ... Bok-Min Goi in Cluster Computing
    Article 20 May 2024
  19. Homomorphic Encryption Library, Framework, Toolkit and Accelerator: A Review

    Homomorphic encryption ensures secure computation on encrypted data without the need for decryption beforehand. It enables the secure offloading of...

    Shalini Dhiman, Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in SN Computer Science
    Article 20 November 2023
  20. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing

    Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making...

    **aolong Zhao, Zhenjie Huang in Cluster Computing
    Article 06 May 2024
Did you find what you were looking for? Share feedback.