S Namasudra - Computers and Electrical Engineering, 2022 - Elsevier
In this digital era, most of the data of an Internet of Things (IoT) infrastructure are communicated over the internet and they are stored in a cloud environment. As there are …
Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …
In this paper, a noise-resistant image encryption scheme is proposed. We have used a cubic- logistic map, Discrete Wavelet Transform (DWT), and bit-plane extraction method to encrypt …
This article proposes a novel approach of improvising the cryptographic features of substitution-boxes (S-Box) based on the Choquet Fuzzy Integral (CFI) and DNA techniques …
In today's world, a substantial number of digital images are conserved and transmitted through diverse online platforms on a daily basis. Preserving the confidentiality of images is …
In the past, many image encryption schemes have been developed through the swapping operations at the different levels of granularity. These levels span bits, Deoxyribonucleic …
The proposed work combines existing one-dimensional chaos maps to create a new two- dimensional logistic cascade map (2D LCM) to produce better chaotic behavior. The system …
P Mathivanan, P Maran - The Imaging Science Journal, 2023 - Taylor & Francis
The paper presents a new method for encrypting color images using a customized globally coupled lattice (CGCL) map. The process involves generating an initial parameter for the …
The processes and systems in the real world actually contain order and symmetry. Understanding these order and symmetrical behavior has been a common effort of …