We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 1,724 results
  1. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform

    The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block...

    Tariq Shah, Tanveer ul Haq in The Journal of Supercomputing
    Article 07 July 2023
  2. A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2

    In this paper, a novel encryption scheme that combines hyperchaotic maps schemes, SHA-2, and a pixel-shifting based on the Zaslavskii map is...

    L. Shane John Paul, Carlton Gracias, ... Amirtharajan Rengarajan in Multimedia Tools and Applications
    Article 22 April 2022
  3. Chaotic-based color image encryption using a hybrid method of reversible cellular automata and DNA sequences

    In this manuscript, a new image cryptography algorithm based on new second-order recursive cellular automata (RCA), DNA sequences, and hyper-chaotic...

    Roghayeh Dehghani, Hossein Kheiri in Multimedia Tools and Applications
    Article 24 July 2023
  4. On the novel image encryption based on chaotic system and DNA computing

    A new image encryption scheme is presented based on the chaotic system and the swap** operations of the pixels both at the decimal and DNA levels....

    Nadeem Iqbal, Muhammad Hanif, ... Muhammad Zohaib in Multimedia Tools and Applications
    Article 31 January 2022
  5. Dynamic analysis of a novel chaotic system with no linear terms and use for DNA-based image encryption

    The present paper proposes the design of a new image encryption scheme based jointly on DNA coding and the chaotic sequence generated by a new 3D...

    Nkapkop Jean De Dieu, Folifack Signing Vitrice Ruben, ... Kengne Jacques in Multimedia Tools and Applications
    Article 16 February 2022
  6. An efficient environmental monitoring data encryption algorithm based on DNA coding and hyperchaotic system

    Securing data in wireless environmental monitoring systems based jointly on Deoxyribonucleic Acid (DNA) database and chaotic sequences is a hot new...

    Jacob Mbarndouka Taamté, Vitrice Ruben Folifack Signing, ... Saïdou in International Journal of Information Technology
    Article 24 February 2022
  7. An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map

    A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is...

    Roayat Ismail Abdelfatah, Hager Mohamed Saqr, Mohamed E. Nasr in Multimedia Tools and Applications
    Article Open access 16 July 2022
  8. A novel exponent–sine–cosine chaos map-based multiple-image encryption technique

    This paper proposes a multiple-image encryption (MIE) approach that uses a novel exponent–sine–cosine (ESC) chaotic map along with the dynamic...

    Atul Kumar, Mohit Dua in Multimedia Systems
    Article 04 May 2024
  9. Lightweight image encryption algorithm using NLFSR and CBC mode

    The digital images are widely captured, transmitted, and stored by limited resource devices. Those devices need lightweight encryption (LWE)...

    Punam Kumari, Bhaskar Mondal in The Journal of Supercomputing
    Article 29 May 2023
  10. Color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation

    In this paper, a color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation (elongation operation, truncation...

    **ngyuan Wang, Yining Su, ... Shuhong Di in The Visual Computer
    Article 31 October 2021
  11. Image encryption using memristive hyperchaos

    In this paper, a novel image encryption algorithm (DMHM-IEA) based on a two-dimensional discrete memristive hyperchaotic map (2D-DMHM) derived from...

    Qiang Lai, Yuan Liu, Liang Yang in Applied Intelligence
    Article 04 July 2023
  12. A new three-dimensional memristor chaotic circuit design and its application in image encryption

    In recent years, memristors have received widespread attention due to their inherent nonlinear characteristics. To this end, a three-dimensional...

    Jie Zhang, Enze Liu, Yan Guo in The Journal of Supercomputing
    Article 25 March 2024
  13. An overview of visually meaningful ciphertext image encryption

    Image encryption algorithm has become one of the hotspots of cryptography research because of its characteristics of large amount of information and...

    **g Shiwei, Li Jianjun in Multimedia Tools and Applications
    Article 11 June 2024
  14. Robust image encryption algorithm in dwt domain

    Over the past few years, the use of chaotic maps have surfaced to become an important topic in the field of image encryption. The majority of...

    Rajwinder Kaur, Butta Singh in Multimedia Tools and Applications
    Article 07 October 2023
  15. Circuit simulation and image encryption based on a six-dimensional cellular neural network hyperchaotic system

    This paper proposes a six-dimensional hyperchaotic system based on the Cellular Neural Networks (CNN) theory. Numerical analysis of the Lyapunov...

    Jie Zhang, Qinggang **e, ... **you Hou in Multimedia Tools and Applications
    Article 07 October 2023
  16. TEXCEL: text encryption with elliptic curve cryptography for enhanced security

    Elliptic curve cryptography has emerged as a potent tool for safeguarding data communications. This research paper addresses the problem of...

    P. L. Sharma, Shalini Gupta, ... Arun Kumar Sharma in Multimedia Tools and Applications
    Article 22 May 2024
  17. An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution

    Traditional encryption algorithms are not suitable and computationally efficient for encrypting multimedia data due to the large size and high...

    Yousef Alghamdi, Arslan Munir in SN Computer Science
    Article 20 September 2023
  18. A comparative review and analysis of medical image encryption and compression techniques

    Owing to the swift development of communication networks, there is a not able rise in the transfer of sensitive information, including military and...

    D. Jeni Jeba Seeli, K. K. Thanammal in Multimedia Tools and Applications
    Article 21 March 2024
  19. Dynamical analysis of four-dimensional chaotic system and its application in image encryption

    In this paper, a phase diagram of a four-dimensional chaotic system is established by introducing cosine function into Lorenz system. Then 0-1 test,...

    Shaohui Yan, Binxian Gu, ... Ertong Wang in Multimedia Tools and Applications
    Article 10 November 2022
  20. A new image encryption method using Bezier curve

    In the present age of information, images contain sensitive and confidential information. It is essential to protect confidential images from...

    Sujit Kumar Das, Bibhas Chandra Dhara in Multimedia Tools and Applications
    Article 03 May 2023
Did you find what you were looking for? Share feedback.