Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

U Zia, M McCartney, B Scotney, J Martinez… - International Journal of …, 2022 - Springer
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …

Adaptive optimal multi key based encryption for digital image security

K Shankar, SK Lakshmanaprabu… - Concurrency and …, 2020 - Wiley Online Library
The security of digital images is an essential and challenging task on shared communication
Model. Generally, high secure working environment and data are also secured with an …

An efficient image encryption scheme based on signcryption technique with adaptive elephant herding optimization

K Shankar, M Elhoseny, E Perumal, M Ilayaraja… - … and Secure Information …, 2019 - Springer
IoT makes incorporated communication circumstances of interconnected devices and stages
by drawing in both practical and substantial worlds simultaneously. The researchers of the …

A literature survey on various image encryption & steganography techniques

M Dahiya, R Kumar - 2018 First International Conference on …, 2018 - ieeexplore.ieee.org
In the current world when entire web contains most of multimedia data then protection of that
data is our major concern. Different techniques are discovered and developed from time to …

[PDF][PDF] Improved image security in internet of thing (IoT) using multiple key AES

KG Salim, SMK Al-alak, MJ Jawad - Baghdad Science Journal, 2021 - iasj.net
Image is an important digital information that used in many internet of things (IoT)
applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc …

Chaotic butterfly optimization with optimal multi-key image encryption technique for wireless sensor networks

D Zheng, K Liang - Journal of Intelligent Systems and Internet of …, 2021 - americaspg.com
Wireless sensor network (WSN) comprises a set of sensor nodes, mainly used for data
collection and tracking process. The imaging sensors in WSN captures the images from the …

[PDF][PDF] Image encryption using vigenere cipher with bit circular shift

A Susanto, T Khotimah, MT Sumadi, J Warsito… - Int. J. Eng …, 2018 - eprints.umk.ac.id
Cryptography is a method of securing text data, images and sound in order to secure its
confidentiality and to minimize data stealing, attack, etc. The purpose of this study is to …

Image tiling using columnar transposition

R Rihartanto, S Supriadi… - … Conference on Applied …, 2018 - ieeexplore.ieee.org
Columnar transposition is a technique commonly used in text encryption to produce cipher
text which is a permutation of its original text. In this study, the columnar transposition and …

[PDF][PDF] Encryption and decryption application on images with hybrid algorithm Vigenere and RSA

R Darari, E Winarko… - Contemp Math and …, 2020 - pdfs.semanticscholar.org
Digital image is digital pictures on a two-dimensional plane which consists of pixels, where
every pixels has Red, Green, Blue (RGB) with varying intensity depending on the image. In …

A New Improved Cryptography Method‐Based e‐Health Application in Cloud Computing Environment

D Kumar, N Mandal, Y Kumar - Tele‐Healthcare: Applications …, 2022 - Wiley Online Library
Nowadays, the world is moving toward the use of mobile apps and web applications for
almost everything, which caused a surge in online data across the world. Cloud computing …