Region of interest-based medical image encryption technique based on chaotic S-boxes

SS Jamal, MM Hazzazi, MF Khan, Z Bassfar… - Expert Systems with …, 2024 - Elsevier
Block cipher has been one of the most reliable options by which data security is achieved.
The strength of block cipher against various attacks is purely dependent on its confusion …

Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems

AN Kengnou Telem, HB Fotsin, J Kengne - Multimedia Tools and …, 2021 - Springer
This paper presents a new image encryption algorithm based on 3D chaotic system and
deoxyribonucleic acid (DNA) coding. It uses two keys, an external one of 128 bits long and …

SMSH: Secure surveillance mechanism on smart healthcare IoT system with probabilistic image encryption

J Khan, JP Li, B Ahamad, S Parveen, AU Haq… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Things is made of diverse networked things (ie, smart, intelligent devices) that
are consistently interconnected, producing meaningful data across the network without …

A chaotic image encryption algorithm based on a counting system and the semi-tensor product

X Wang, S Gao - Multimedia Tools and Applications, 2021 - Springer
Based on the n-ary counting system, combined with the matrix semi-tensor product theory
and Hilbert curve, a chaotic image encryption algorithm is designed. Different from the …

Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption

J Khan, GA Khan, JP Li, MF AlAjmi… - Scientific …, 2022 - Wiley Online Library
The technological progression is raised as a hybrid ecosystem with the industrial Internet of
Things (IIoT). Among them, healthcare is also broadly unified with the Internet of Things to …

Adversarial attacks on deep-learning-based radar range profile target recognition

T Huang, Y Chen, B Yao, B Yang, X Wang, Y Li - Information Sciences, 2020 - Elsevier
Target recognition based on a high-resolution range profile (HRRP) has always been a
research hotspot in the radar signal interpretation field. Deep learning has been an …

An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component

A Alghafis, N Munir, M Khan - Multimedia Tools and Applications, 2021 - Springer
In this research article, we have proposed a novel image encryption scheme for the
confidentiality of digital information. The modern block ciphers based on confusion and …

Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map

N Munir, M Khan, SS Jamal, MM Hazzazi… - … and Computers in …, 2021 - Elsevier
Recently a hybrid secure image encryption scheme based on Julia set and three-
dimensional Lorenz chaotic system was suggested. The offered scheme was based on the …

[HTML][HTML] Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment

MM Khayyat, MM Khayyat, S Abdel-Khalek… - Alexandria Engineering …, 2022 - Elsevier
Abstract Industrial Internet of Things (IIoT) denotes a network of interlinked sensors,
instruments, and other devices for industrial applications in the domains of manufacturing …

A review of cyber security in cryptography: Services, attacks, and key approach

C Prabha, N Sharma, J Singh… - … and Smart Energy …, 2023 - ieeexplore.ieee.org
Security has become more important in several industries in recent years. It's not that the
necessity to protect data is new; it dates back to the first and second world wars, and even to …