Z Gu, H Li, S Khan, L Deng, X Du… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However …
In recent years, due to their straightforward structure and efficiency, the chaos-based cryptographic algorithms have become a good candidate for image encryption. However …
A Gupta, D Singh, M Kaur - Journal of Ambient Intelligence and …, 2020 - Springer
Chaotic maps are extensively utilized in the field of image encryption to generate secret keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …
Chaos‐based encryption algorithms offer many advantages over conventional cryptographic algorithms, such as speed, high security, affordable overheads for computation, and …
H Li, L Deng, Z Gu - IEEE Access, 2020 - ieeexplore.ieee.org
In these years, image encryption systems based on chaotic maps have received considerable attention from researchers. For the security of encryption algorithms, it is …
The images generated by smart cameras and sensors in an Industrial Internet of Things (IIoT) ecosystem are at significant risk when transmitted over a public network due to the …
With the rapid development of information technology, the security of images has emerged as a significant area of research. This study presents an algorithm that integrates chaotic …
B Ge, X Chen, G Chen, Z Shen - IEEE Access, 2021 - ieeexplore.ieee.org
To protect image data privacy, a secure and fast image encryption algorithm using hyper- chaos based key generator and vector operation is proposed. Firstly, we introduce a novel …
Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content …