Anteater: When arnold's cat meets langton's ant to encrypt images

W Alexan, Y Korayem, M Gabr, M El-Aasser… - IEEE …, 2023 - ieeexplore.ieee.org
With the proliferation of digital images over open networks, secure and efficient encryption
schemes are imperative for safeguarding image privacy. This paper proposes a novel 5 …

An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations

DRIM Setiadi, N Rijati - Computation, 2023 - mdpi.com
Confusion, diffusion, and encryption keys affect the quality of image encryption. This
research proposes combining bit-and pixel-level permutation and substitution methods …

[HTML][HTML] Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption

E Winarno, K Nugroho, PW Adi - … of King Saud University-Computer and …, 2023 - Elsevier
This paper introduces an enhanced image encryption technique that relies on 3D confusion
and diffusion patterns, aiming to achieve maximum performance in terms of confusion and …

[HTML][HTML] DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane

W Zhang, J Xu, B Zhao - Journal of King Saud University-Computer and …, 2023 - Elsevier
In response to the problem of uneven information distribution in DNA encoding, in this
article, a new DNA chaotic image encryption algorithm combining serrated spiral scrambling …

A lightweight image encryption scheme using dna coding and chaos

MA Fetteha, WS Sayed, LA Said - Electronics, 2023 - mdpi.com
Protecting transmitted multimedia data such as images is a significant concern. This work
proposes an encryption algorithm for greyscale images using a Pseudo-Random Number …

Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism

MA Al Sibahee, ZA Abduljabbar, C Luo, J Zhang… - Plos one, 2024 - journals.plos.org
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …

Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security

MU Rehman, A Shafique, KH Khan, M Olamaie… - IEEE …, 2023 - ieeexplore.ieee.org
In the era of big data, protecting digital images from cyberattacks during network
transmission is of utmost importance. While various image encryption algorithms have been …

AES Security Improvement by Utilizing New Key-Dependent XOR Tables

TT Luong, NN Cuong, B Vo - IEEE Access, 2024 - ieeexplore.ieee.org
Increasing the security of block ciphers is a topic of great interest today, and thus there is a
variety of work to enhance the strength of such ciphers. There are also many studies …

Can There Be a Two Way Hash Function?

T Koroglu, R Samet - IEEE Access, 2024 - ieeexplore.ieee.org
It is computationally impossible for one-way hash functions to obtain the original data again.
In this study, Two Way Hash Function (TWHF) is proposed which provides the security …

[PDF][PDF] Enhanced color image encryption utilizing a novel Vigenere method with pseudorandom affine functions

H El Bourakkadi, A Chemlal, H Tabti… - … Trans. Mach. Learn, 2024 - library.acadlore.com
In the realm of digital image security, this study presents an innovative encryption
methodology for color images, significantly advancing the traditional Vigenere cipher …