Search
Search Results
-
Cross-domain encryption scheme with equality test for wireless body area networks
Wireless body area networks (WBANs) are rapidly becoming a vital component of the medical industry, in which massive body data is encrypted and then...
-
An encryption scheme for MQIR based on binary key image and qubit rotation
With the development of quantum image processing, the sensitive information and potential security risks carried by quantum images are increasing....
-
An image compression encryption scheme based on chaos and SPECK-DCT hybrid coding
In recent years, image compression and encryption joint algorithms usually focus on only one kind of lossless compression or lossless compression,...
-
Encryption + Watermarking: A Duo Approach for Secure Image Communication in Transform Domain
When images are transmitted over networks, there is a risk of interception by malicious users. Encrypting images before transmission ensure that even... -
Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique
This research suggests a unique ECG security solution based on the data pattern-based encryption paradigm to address security issues in ECG signal...
-
Image encryption based on actual chaotic map** using optical reservoir computing
Driven by the growing significance of information security, the field of image encryption is attracting increasing interest. This work solves an...
-
Cryptanalysis of substitution-permutation network based image encryption schemes: a systematic review
Modern-day’s digital world witnesses large-scale transmissions of various media forms (including images) in resource-constrained environments. The...
-
Signal-sensing dynamic S-box image encryption with 2D Griewank–sin map
Chaos systems serve as crucial tools in information security, particularly in applications such as image encryption and multimedia encryption....
-
A new self-embedding digital watermarking encryption scheme
For image information transmission security and copyright disputes, a novel and effective digital image watermarking encryption scheme is designed by...
-
Fast Attack Algorithm for JPEG Image Encryption with Block Position Shuffle
For traditional JPEG image encryption, block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack....
-
A Region-Selective Anti-compression Image Encryption Algorithm Based on Deep Networks
In recent years, related research has focused on how to safely transfer and protect the privacy of images in social network services while providing...
-
A visual meaningful encryption and hiding algorithm for multiple images
To protect the privacy of multiple images simultaneously in the digital information era, this paper proposes a novel multi-image encryption and...
-
A hybrid encryption approach for efficient and secure data transmission in IoT devices
Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices' constrained processing and storage resources, providing...
-
Multi-key spatio-temporal chaotic image encryption and retrieval scheme
To protect privacy, many users opt to encrypt images prior to outsourcing them to cloud service platforms (CSPs). However, this encryption process...
-
Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things
Recently, the field of lightweight cryptography (LWC) has emerged in response to the security needs of low-cost, widely used technology. It is...
-
High-dimensional Poincaré beams generated through cascaded metasurfaces for high-security optical encryption
Optical encryption plays an increasingly important role in the field of information security owing to its parallel processing capability and low...
-
Novel image encryption algorithm using hybrid 3D-ICPCM and hessenberg decomposition
This study introduces a novel image encryption algorithm by combining the capabilities of a three-dimensional chaotic map (3D-ICPCM) and Hessenberg...
-
Visual double image encryption scheme based on multilayer complex networks and wavelet transform
This paper explores the synchronizability within a three-layer network, which has the feature of identical topologies across layers but with three...
-
Data hiding in encryption–compression domain
This paper introduces a robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain. First, host image is...
-
Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method
Nonlinear dynamic systems and chaotic systems have been quite exhaustively researched in the domain of cryptography. However, the possibility of...