A survey of image encryption algorithms

M Kumari, S Gupta, P Sardana - 3D Research, 2017 - Springer
Security of data/images is one of the crucial aspects in the gigantic and still expanding
domain of digital transfer. Encryption of images is one of the well known mechanisms to …

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

U Zia, M McCartney, B Scotney, J Martinez… - International Journal of …, 2022 - Springer
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …

Flexible architectures for cryptographic algorithms—A systematic literature review

M Rashid, M Imran, AR Jafri… - Journal of Circuits …, 2019 - World Scientific
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …

Efficient security and authentication for edge-based internet of medical things

SA Parah, JA Kaw, P Bellavista… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Medical Things (IoMT)-driven smart health and emotional care is revolutionizing
the healthcare industry by embracing several technologies related to multimodal …

Analysis of security and privacy issues of information management of big data in B2B based healthcare systems

BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …

Green ICT communication, networking and data processing

M Adimoolam, A John, NM Balamurugan… - Green computing in …, 2021 - Springer
Green ICT is the Green Information Technology or Green computing and it is required for
keeping the Harmless Green Environment even when people are using Electronic …

CASDC: a cryptographically secure data system based on two private key images

A Al-Hyari, I Al-Taharwa, B Al-Ahmad, Z Alqadi - IEEE Access, 2022 - ieeexplore.ieee.org
Colored digital images are one of the most important types of digital data to be used in many
vital applications, which require a safe way to protect them from hacking operations and the …

An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms

MH Abood - 2017 annual conference on new trends in …, 2017 - ieeexplore.ieee.org
For secure data transmission over internet, it is important to transfer data in high security and
high confidentiality, information security is the most important issue of data communication in …

Chaos-based joint speech encryption scheme using SHA-1

G Kaur, K Singh, HS Gill - Multimedia tools and applications, 2021 - Springer
In this paper, the speech signal is encrypted using multiple chaotic maps and cryptographic
protocols. The input signal is fragmented and scrambled into four segments using cubic …

Advancements in social data security and encryption: A review

YS Sangwan, S Lal, P Bhambri, A Kumar… - NVEO-Natural Volatiles & …, 2021 - nveo.org
These days message application administrations are in extraordinary interest, as they
offered start to finish encryption (E2EE) that is fundamental to give security to the clients …