Search
Search Results
-
Fast chaotic encryption scheme based on separable moments and parallel computing
In this paper, we propose three novel image encryption algorithms. Separable moments and parallel computing are combined in order to enhance the...
-
Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation
Nowadays, establishing security in data transmission is essential, and it is achieved by cryptography. Encryption of still or video images in...
-
A novel single kernel parallel image encryption scheme based on a chaotic map
The development of communication technologies has increased concerns about data security, increasing the prominence of cryptography. Images are one...
-
Image encryption algorithms based on two-dimensional discrete hyperchaotic systems and parallel compressive sensing
In this paper, a new two-dimensional discrete hyperchaotic system is proposed. Verification using the phase-track map, bifurcation map and Lyapunov...
-
Parallel multi-image encryption based on cross-plane DNA manipulation and a novel 2D chaotic system
In this paper, we propose a novel parallel multi-image encryption algorithm based on cross-plane DNA operations. Firstly, a two-dimensional chaotic...
-
Triple-image visually secure encryption scheme based on newly designed chaotic map and parallel compressive sensing
This paper proposes a novel triple-image visually secure encryption algorithm based on a newly designed chaotic map and parallel compressive sensing...
-
A new fast image compression–encryption scheme based on compressive sensing and parallel blocks
This paper proposes a new fast image compression–encryption scheme based on compressive sensing and parallel blocks. To reduce the encryption time in...
-
An efficient meaningful double-image encryption algorithm based on parallel compressive sensing and FRFT embedding
The transmission of images via the Internet has grown exponentially in the past few decades. However, the Internet considered as an insecure method...
-
A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing
Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control.... -
High-dimensional Poincaré beams generated through cascaded metasurfaces for high-security optical encryption
Optical encryption plays an increasingly important role in the field of information security owing to its parallel processing capability and low...
-
An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications
Image encryption algorithms based on Chaotic approach are becoming increasingly popular for remotely sensed images using parallel techniques. It has...
-
Attribute-based multiparty searchable encryption model for privacy protection of text data
The problems of data storage and sharing have been well solved with cloud storage. However, the disadvantage is that users' messages are stored in...
-
Image encryption techniques: A comprehensive review
This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to...
-
Dual-layer optical encryption fluorescent polymer waveguide chip based on optical pulse-code modulation technique
Information encryption technique has broad applications in individual privacy, military confidentiality, and national security, but traditional...
-
Partial-privacy image encryption algorithm based on time-varying delayed exponentially controlled chaotic system
To enhance privacy protection for specific regions within an image while preserving its overall visual integrity, this paper presents a visual...
-
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform
The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block...
-
Holographic encryption algorithm based on DNA coding and bit-plane decomposition
In recent years, encryption algorithms have undergone rapid development, finding extensive applications across diverse industries. In the pursuit of...
-
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform
Authenticated encryption with associated data (AEAD) has become prominent over time because it offers authenticity and confidentiality...
-
Homomorphic Encryption Library, Framework, Toolkit and Accelerator: A Review
Homomorphic encryption ensures secure computation on encrypted data without the need for decryption beforehand. It enables the secure offloading of...
-
Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing
Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making...