[HTML][HTML] Rgb image encryption through cellular automata, s-box and the lorenz system

W Alexan, M ElBeltagy, A Aboshousha - Symmetry, 2022 - mdpi.com
The exponential growth in transmission of multimedia over the Internet and unsecured
channels of communications is putting pressure on scientists and engineers to develop …

An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges

A Waheed, F Subhan, MM Suud, M Alam… - Multimedia Tools and …, 2023 - Springer
The expansion of worldwide networking has created new possibilities for management,
development, and presentation in the form of digital data. The uncomplicated accessibility to …

[HTML][HTML] Color image encryption using a Zigzag Transformation and sine-cosine maps

F ElAzzaby, KH Sabour, N ELakkad, W El-Shafai… - Scientific African, 2023 - Elsevier
This research endeavor is dedicated to enhancing data confidentiality in internet
transmissions by strategically employing Hash functions and harnessing the advantageous …

Multi-stage rgb image encryption

M Gabr, W Alexan, K Moussa, B Maged… - 2022 International …, 2022 - ieeexplore.ieee.org
The demand for efficient picture encryption techniques is growing all the time. Meanwhile,
recent research has demonstrated that using chaotic functions and PRNG to administrate …

Color image encryption using 2D sine-cosine coupling map

Z Zhang, J Tang, F Zhang, H Ni, J Chen… - Ieee Access, 2022 - ieeexplore.ieee.org
In this paper, a new two-dimensional sine-cosine coupling chaos map (2D-SCCM) is
proposed. The performance of the proposed two-dimensional chaotic system is analysed by …

Image encryption through ca, chaos and lucas sequence based s-box

M Gabr, W Alexan, K Moussa - 2022 Signal Processing …, 2022 - ieeexplore.ieee.org
The ever increasing developments in communication technologies and the rate of
multimedia production has put pressure on the scientific community to develop matching …

Securing images using high dimensional chaotic maps and DNA encoding techniques

M Es-Sabry, N El Akkad, M Merras, K Satori… - IEEE …, 2023 - ieeexplore.ieee.org
With the growing need for secure multimedia data transmission, image encryption has
become an important research area. Traditional encryption algorithms like RSA are not well …

[HTML][HTML] An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations

DRIM Setiadi, N Rijati - Computation, 2023 - mdpi.com
Confusion, diffusion, and encryption keys affect the quality of image encryption. This
research proposes combining bit-and pixel-level permutation and substitution methods …

Multi-objective evolution of strong S-boxes using non-dominated sorting genetic algorithm-II and chaos for secure telemedicine

M Ahmad, R Alkanhel, W El-Shafai, AD Algarni… - IEEE …, 2022 - ieeexplore.ieee.org
There exist several performance criteria for cryptographically-strong substitution boxes (S-
boxes), which are often conflicting with each other. Constructing S-boxes that satisfy multiple …

[HTML][HTML] A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks

A Shafique, A Mehmood, M Alawida, M Elhadef… - Multimedia Tools and …, 2024 - Springer
Within the domain of image encryption, an intrinsic trade-off emerges between
computational complexity and the integrity of data transmission security. Protecting digital …