M Gupta, KK Gupta, PK Shukla - Multimedia Tools and Applications, 2021 - Springer
In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, a reliable …
Over the past few years, there has been a rise in the utilization of chaotic encryption algorithms for securing images. The majority of chaos-based encryption algorithms adhere …
Chaos-based encryption may offer new quality in secure data transmission. A recently proposed Chaotic Key-Based Algorithm (CKBA) has been shown to be unavoidably …
MT Suryadi, E Nurpeti - … Computing Electronics and Control), 2014 - telkomnika.uad.ac.id
Presentation of information in digital form is highly vulnerable againts information abusing. Digital image is one of digital information which is frequently becomes a target of crime …
In today's digital world, massive amount of sensitive information is being generated in the form of image and further it is shared via Internet. Maintaining the confidentiality of these …
B Ge, X Chen, G Chen, Z Shen - IEEE Access, 2021 - ieeexplore.ieee.org
To protect image data privacy, a secure and fast image encryption algorithm using hyper- chaos based key generator and vector operation is proposed. Firstly, we introduce a novel …
A new fast image cryptosystem was studied in this paper. The system employed the piecewise linear chaotic map and cubic S-box to generate key stream with excellent …
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or …
Due to the increasing demand for IoMT applications in numerous fields such as healthcare, smart city, smart grids, industrial internet, etc. The privacy and security become a major issue …