A group theoretic construction of highly nonlinear substitution box and its applications in image encryption

A Razaq, S Akhter, A Yousaf, U Shuaib… - Multimedia Tools and …, 2022 - Springer
image encryption applications. The results of these analyses confirm the reliability of our
S-box in image encryption … In Section 2 we present some group theoretic concepts used to …

[HTML][HTML] A study of text-theoretical approach to S-box construction with image encryption applications

A Mahboob, M Nadeem, MW Rasheed - Scientific Reports, 2023 - nature.com
… In this manuscript, a text-theoretical approach is used for the construction of effective S-boxes.
Text encryption by using the Adjacency matrix of Graphs is used in different branches of …

The design of a novel multiple-parameter fractional number-theoretic transform and its application to image encryption

JR de Oliveira Neto, JB Lima… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… context, several investigations have been focused on the construction of image encryption
… Number-theoretic transforms have also performed a remarkable role in the mentioned …

A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem

Y Ke, M Zhang, X Zhang, J Liu, T Su… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… on the image shares before image construction to ensure the … Image encryption is required
to reduce the absolute value of … The theoretical embedding rate of an image share for DE-ID …

Quantum image encryption based on iterative framework of frequency-spatial domain transforms

H Wang, J Wang, YC Geng, Y Song, JQ Liu - … Journal of Theoretical …, 2017 - Springer
… , such as the novel quantum image encryption using one-… image encryption algorithm
based on quantum image XOR operations advanced [28], and a quantum color image encryption

Design and analysis of a novel digital image encryption scheme

NK Pareek - arXiv preprint arXiv:1204.1603, 2012 - arxiv.org
… Authors constructed a large permutation matrix from generated small matrixes. … image
encryption. This indeterminateness can be reflected by one of the most commonly used theoretical

Chaos-based image encryption

EB Corrochano, Y Mao, G Chen - Handbook of geometric computing …, 2005 - Springer
… baker map was given to illustrate the construction procedure and to demonstrate the
security… numbers to mask a plaintext can achieve theoretical security [35], its practical …

New approach to image encryption

TJ Chuang, JC Lin - Journal of electronic imaging, 1998 - spiedigitallibrary.org
… The theoretical analysis needed to support the proposed … We review below some recent
image encryption techniques. … construction of the encrypted image. The speckle-free kinoform …

Robust image encryption with scanning technology, the El-Gamal algorithm and chaos theory

SF Yousif, AJ Abboud, HY Radhi - IEEE Access, 2020 - ieeexplore.ieee.org
… Within the construction of the presented security approach, the Lorenz system and Rössler
… The theoretical ideal entropy value should be equal to 8. Larger entropy values imply a high …

Image encryption algorithm based on logistic and two-dimensional lorenz

T Li, B Du, X Liang - Ieee Access, 2020 - ieeexplore.ieee.org
… In [37], a bit-level image encryption algorithm is constructed using a simple piecewise linear
… N = 256 = 28 and 8bit represents the gray scale, the theoretical value of entropy H(S) is 8. …