Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

U Zia, M McCartney, B Scotney, J Martinez… - International Journal of …, 2022 - Springer
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …

Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …

A fast text-to-image encryption-decryption algorithm for secure network communication

NS Noor, DA Hammood, A Al-Naji, J Chahl - Computers, 2022 - mdpi.com
Data security is the science of protecting data in information technology, including
authentication, data encryption, data decryption, data recovery, and user protection. To …

[PDF][PDF] An overview of image security techiques

B Madhu, G Holi, KS Murthy - International Journal of Computer …, 2016 - academia.edu
Today, the world is going to be digitalized in all the ways. Every business units, government
and private sectors, research units are using the digital image as transferring mode for every …

A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …

[PDF][PDF] A secure network communication protocol based on text to barcode encryption algorithm

A Ahmad, B Hawashin - International Journal of Advanced …, 2015 - researchgate.net
There are various methods for securing data on the internet and ensuring its privacy; one of
these methods is data encryption. This technique is used to protect the data from hackers by …

Secure digital image watermarking by using SVD and AES

KM Sahila, B Thomas - … Data Communication Technologies and Internet of …, 2021 - Springer
In recent times, digital data is widely used for processing and sometimes the processed data
is needed to be transmitted from one organization to other. For such situations, secure …

A Survey: Threat Hunting for the OT Systems

A Abzakh, AAA Alkhatib, O Rabayah… - 2023 International …, 2023 - ieeexplore.ieee.org
Threat hunting is an essential practice in protecting operational technology (OT) systems
from cyber threats. The convergence of information technology (IT) and OT systems has …

[PDF][PDF] Distributed text-to-image encryption algorithm

A Ahmad, T Mohammad, HM Almimi - International Journal of Computer …, 2014 - Citeseer
Data encryption techniques are used to protect data against hackers. Text-to-Image
encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The …

[PDF][PDF] A novel network security algorithm based on encrypting text into a white-page image

ZM Ahmad Abusukhon, M Talib - Proceedings of the World Congress …, 2016 - academia.edu
Nowadays, data security becomes a big issue and a challenge when sending sensitive data
through the Internet. For example; sending user password, performing money transaction (e …