[HTML][HTML] Enhancement of the cast block algorithm based on novel S-box for image encryption

RS Ali, OZ Akif, SA Jassim, AK Farhan, ESM El-Kenawy… - Sensors, 2022 - mdpi.com
Background and Aim: due to the rapid growth of data communication and multimedia system
applications, security becomes a critical issue in the communication and storage of images …

[HTML][HTML] Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives

I Ahmad, W Choi, S Shin - Sensors, 2023 - mdpi.com
Perceptual encryption (PE) hides the identifiable information of an image in such a way that
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …

Novel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model

Z Zhou, X Xu, Y Yao, Z Jiang, K Sun - Chaos, Solitons & Fractals, 2023 - Elsevier
Current multiple-image encryption schemes usually require a fixed number or the same size
of images. Therefore, this paper proposes a multiple-image encryption algorithm that can …

[HTML][HTML] AI makes crypto evolve

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

Crypto makes ai evolve

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Adopting cryptography has given rise to a significant? evolution in AI. This chapter studies
the path and stages of this evolution. We start with reviewing existing relevant surveys …

[PDF][PDF] Hybrid Watermarking and Encryption Techniques for Securing Medical Images.

AA Alhussan, HA Abdallah, S Alsodairi… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
Securing medical data while transmission on the network is required because it is sensitive
and life-dependent data. Many methods are used for protection, such as Steganography …

ICFCM-MIE: Improved Cosine Fractional Chaotic Map based Medical Image Encryption

S Dua, A Kumar, M Dua, D Dhingra - Multimedia Tools and Applications, 2024 - Springer
Advanced healthcare applications such as telemedicine, smart health, and e-health transmit
digital images over an open and insecure communication network. Hence, it becomes …

[HTML][HTML] Fractal-based hybrid cryptosystem: Enhancing image encryption with RSA, homomorphic encryption, and chaotic maps

DE Mfungo, X Fu - Entropy, 2023 - mdpi.com
Protecting digital data, especially digital images, from unauthorized access and malicious
activities is crucial in today's digital era. This paper introduces a novel approach to enhance …

[HTML][HTML] A chaos-metastability TRNG for natively flexible IGZO circuits

K Gołofit, PZ Wieczorek, M Pilarz - AEU-International Journal of Electronics …, 2023 - Elsevier
Modern technologies of truly flexible integrated circuits are usually based on large single-
type transistors. If considered as a platform for Internet-of-Things (IoT) devices, they would …