We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,370 results
  1. Cross-domain encryption scheme with equality test for wireless body area networks

    Wireless body area networks (WBANs) are rapidly becoming a vital component of the medical industry, in which massive body data is encrypted and then...

    Ming Luo, Yusi Pei, Ai Chen in Wireless Networks
    Article 16 April 2022
  2. An encryption scheme for MQIR based on binary key image and qubit rotation

    With the development of quantum image processing, the sensitive information and potential security risks carried by quantum images are increasing....

    Zigang Chen, Yi Yan, ... Yuhong Liu in Nonlinear Dynamics
    Article 27 October 2023
  3. An image compression encryption scheme based on chaos and SPECK-DCT hybrid coding

    In recent years, image compression and encryption joint algorithms usually focus on only one kind of lossless compression or lossless compression,...

    Jiaqi Wang, Miao Zhang, ... Zhu Wang in Nonlinear Dynamics
    Article 27 April 2024
  4. Encryption + Watermarking: A Duo Approach for Secure Image Communication in Transform Domain

    When images are transmitted over networks, there is a risk of interception by malicious users. Encrypting images before transmission ensure that even...
    R. Sivaraman, D. Yasvanthira Sri, ... C. Lakshmi in ICT: Cyber Security and Applications
    Conference paper 2024
  5. Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique

    This research suggests a unique ECG security solution based on the data pattern-based encryption paradigm to address security issues in ECG signal...

    A. N. Sanjeev Kumar, B. Ramesh Naik in Soft Computing
    Article 14 June 2023
  6. Image encryption based on actual chaotic map** using optical reservoir computing

    Driven by the growing significance of information security, the field of image encryption is attracting increasing interest. This work solves an...

    **ao Jiang, Yiyuan **e, ... Haodong Yuan in Nonlinear Dynamics
    Article 28 June 2023
  7. Cryptanalysis of substitution-permutation network based image encryption schemes: a systematic review

    Modern-day’s digital world witnesses large-scale transmissions of various media forms (including images) in resource-constrained environments. The...

    Sakshi Dhall, Khushboo Yadav in Nonlinear Dynamics
    Article 20 June 2024
  8. Signal-sensing dynamic S-box image encryption with 2D Griewank–sin map

    Chaos systems serve as crucial tools in information security, particularly in applications such as image encryption and multimedia encryption....

    Cong Ding, Ru Xue in Nonlinear Dynamics
    Article 07 November 2023
  9. A new self-embedding digital watermarking encryption scheme

    For image information transmission security and copyright disputes, a novel and effective digital image watermarking encryption scheme is designed by...

    Linian Wang, Santo Banerjee, ... Bo Sun in Nonlinear Dynamics
    Article 06 April 2024
  10. Fast Attack Algorithm for JPEG Image Encryption with Block Position Shuffle

    For traditional JPEG image encryption, block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack....

    Shanshan Li, Yali Guo, ... Ruoyun Gao in Journal of Shanghai Jiaotong University (Science)
    Article 13 December 2023
  11. A Region-Selective Anti-compression Image Encryption Algorithm Based on Deep Networks

    In recent years, related research has focused on how to safely transfer and protect the privacy of images in social network services while providing...

    Zhenqiang Chen, Yifeng Liu, ... Sio-long Lo in International Journal of Computational Intelligence Systems
    Article Open access 13 May 2024
  12. A visual meaningful encryption and hiding algorithm for multiple images

    To protect the privacy of multiple images simultaneously in the digital information era, this paper proposes a novel multi-image encryption and...

    Guodong Ye, Liming Guo in Nonlinear Dynamics
    Article 08 June 2024
  13. A hybrid encryption approach for efficient and secure data transmission in IoT devices

    Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices' constrained processing and storage resources, providing...

    Article Open access 20 June 2024
  14. Multi-key spatio-temporal chaotic image encryption and retrieval scheme

    To protect privacy, many users opt to encrypt images prior to outsourcing them to cloud service platforms (CSPs). However, this encryption process...

    Yu Wang, Liquan Chen, ... Huiyu Fang in Nonlinear Dynamics
    Article 23 December 2023
  15. Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things

    Recently, the field of lightweight cryptography (LWC) has emerged in response to the security needs of low-cost, widely used technology. It is...

    Ali Mohammad Norouzzadeh Gilmolk, Mohammad Reza Aref in International Journal of Computational Intelligence Systems
    Article Open access 13 June 2024
  16. High-dimensional Poincaré beams generated through cascaded metasurfaces for high-security optical encryption

    Optical encryption plays an increasingly important role in the field of information security owing to its parallel processing capability and low...

    Jitao Ji, Chen Chen, ... Tao Li in PhotoniX
    Article Open access 17 April 2024
  17. Novel image encryption algorithm using hybrid 3D-ICPCM and hessenberg decomposition

    This study introduces a novel image encryption algorithm by combining the capabilities of a three-dimensional chaotic map (3D-ICPCM) and Hessenberg...

    Vivek Verma, Sanjeev Kumar, Narbda Rani in Nonlinear Dynamics
    Article 30 April 2024
  18. Visual double image encryption scheme based on multilayer complex networks and wavelet transform

    This paper explores the synchronizability within a three-layer network, which has the feature of identical topologies across layers but with three...

    Shuying Wang, Ling Hong, Jun Jiang in Nonlinear Dynamics
    Article 04 June 2024
  19. Data hiding in encryption–compression domain

    This paper introduces a robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain. First, host image is...

    O. P. Singh, A. K. Singh in Complex & Intelligent Systems
    Article Open access 09 March 2021
  20. Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method

    Nonlinear dynamic systems and chaotic systems have been quite exhaustively researched in the domain of cryptography. However, the possibility of...

    Chunxiao Yang, Ina Taralova, ... Jean-Jacques Loiseau in Nonlinear Dynamics
    Article 31 May 2022
Did you find what you were looking for? Share feedback.