A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution

J Arif, MA Khan, B Ghaleb, J Ahmad, A Munir… - IEEE …, 2022 - ieeexplore.ieee.org
Privacy is a serious concern related to sharing videos or images among people over the
Internet. As a method to preserve images' privacy, chaos-based image encryption algorithms …

Image encryption using a novel hybrid chaotic map and dynamic permutation− diffusion

A Kumar, M Dua - Multimedia Tools and Applications, 2024 - Springer
In last few years, chaotic maps are being used extensively by the researchers to build image
cryptosystems. This paper proposes a novel Hybrid chaotic map, and discusses the …

[HTML][HTML] DIdM-EIoTD: Distributed identity management for edge Internet of Things (IoT) devices

KM Sadique, R Rahmani, P Johannesson - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) paradigm aims to enhance human society and living standards
with the vast deployment of smart and autonomous devices, which requires seamless …

A highly secured image encryption scheme using quantum walk and chaos

MI Kamran, MA Khan, SA Alsuhibany… - Computers …, 2022 - strathprints.strath.ac.uk
The use of multimedia data sharing has drastically increased in the past few decades due to
the revolutionary improvements in communication technologies such as the 4th generation …

[PDF][PDF] A State-of-the-Art Technique for Malware Detection Based on Deep Learning in IoT Environment

MM ALI, W ZHENFEI, HOU WEIYAN, Z SHAUKAT… - 2022 - academia.edu
Abstract Internet of Things (IoT) devices are used to sense, gather, transmit and control data.
IoT improves user experiences by connecting and sharing information across smart devices …