[HTML][HTML] New compression–encryption algorithm using chaos-based dynamic session key

E Setyaningsih, R Wardoyo, AK Sari - International Journal on Smart …, 2018 - sciendo.com
Abstract This research proposes New Compression–Encryption Algorithm Using Chaos-
Based Dynamic Session Key (CEA-CBDSK) to encrypt image data. CEA-CBDSK consists of …

Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover

M Gupta, KK Gupta, PK Shukla - Multimedia Tools and Applications, 2021 - Springer
In the current era, the majority of communication in IoT-enabled devices, such as
smartphones, is now done through images. To shield the images from invaders, a reliable …

[HTML][HTML] Efficient and secure image encryption using key substitution process with discrete wavelet transform

MU Rehman, A Shafique, KH Khan… - Journal of King Saud …, 2023 - Elsevier
Over the past few years, there has been a rise in the utilization of chaotic encryption
algorithms for securing images. The majority of chaos-based encryption algorithms adhere …

Discrete wavelet transform and modified chaotic key-based algorithm for image encryption and its VLSI realization

K Deergha Rao, C Gangadhar - IETE Journal of Research, 2012 - Taylor & Francis
Chaos-based encryption may offer new quality in secure data transmission. A recently
proposed Chaotic Key-Based Algorithm (CKBA) has been shown to be unavoidably …

Performance of chaos-based encryption algorithm for digital image

MT Suryadi, E Nurpeti - … Computing Electronics and Control), 2014 - telkomnika.uad.ac.id
Presentation of information in digital form is highly vulnerable againts information abusing.
Digital image is one of digital information which is frequently becomes a target of crime …

An image encryption algorithm with hermite chaotic polynomials and scan pattern

T Sivakumar, M Pandi, NS Madasamy… - Journal of Physics …, 2021 - iopscience.iop.org
In today's digital world, massive amount of sensitive information is being generated in the
form of image and further it is shared via Internet. Maintaining the confidentiality of these …

Secure and fast image encryption algorithm using hyper-chaos-based key generator and vector operation

B Ge, X Chen, G Chen, Z Shen - IEEE Access, 2021 - ieeexplore.ieee.org
To protect image data privacy, a secure and fast image encryption algorithm using hyper-
chaos based key generator and vector operation is proposed. Firstly, we introduce a novel …

The unified image encryption algorithm based on chaos and cubic S-Box

Y Zhang - Information Sciences, 2018 - Elsevier
A new fast image cryptosystem was studied in this paper. The system employed the
piecewise linear chaotic map and cubic S-box to generate key stream with excellent …

[HTML][HTML] Secure image encryption using chaotic, hybrid chaotic and block cipher approach

N Chaudhary, TB Shahi, A Neupane - Journal of Imaging, 2022 - mdpi.com
Secure image transmission is one of the most challenging problems in the age of
communication technology. Millions of people use and transfer images for either personal or …

An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for internet of multimedia things

M Gupta, KK Gupta, MR Khosravi, PK Shukla… - Wireless Personal …, 2021 - Springer
Due to the increasing demand for IoMT applications in numerous fields such as healthcare,
smart city, smart grids, industrial internet, etc. The privacy and security become a major issue …