[HTML][HTML] A medical image encryption scheme based on Mobius transformation and Galois field

J Ali, MK Jamil, AS Alali, R Ali - Heliyon, 2024 - cell.com
Data security and privacy are considered to be the biggest problems faced by service
providers who have worked with public data for a long time. A key element of modern …

[HTML][HTML] A highly nonlinear S-box based on a fractional linear transformation

S Farwa, T Shah, L Idrees - SpringerPlus, 2016 - Springer
We study the structure of an S-box based on a fractional linear transformation applied on the
Galois field GF (2^ 8) GF (2 8). The algorithm followed is very simple and yields an S-box …

A novel image encryption technique based on mobius transformation

M Asif, S Mairaj, Z Saeed, MU Ashraf… - Computational …, 2021 - Wiley Online Library
The nonlinear transformation concedes as S‐box which is responsible for the certainty of
contemporary block ciphers. Many kinds of S‐boxes are planned by various authors in the …

A novel image encryption based on algebraic S-box and Arnold transform

S Farwa, N Muhammad, T Shah, S Ahmad - 3D Research, 2017 - Springer
Recent study shows that substitution box (S-box) only cannot be reliably used in image
encryption techniques. We, in this paper, propose a novel and secure image encryption …

An algorithm for construction of substitution box based on subfield of galois field and dynamic linear fractional transformation

S Zafar, B Idrees, T Rashid - Multimedia Tools and Applications, 2023 - Springer
In block encryption algorithms the only nonlinear component, which creates confusion and
diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important …

A novel image encryption technique based on cyclic codes over Galois field

M Asif, JKK Asamoah, MM Hazzazi… - Computational …, 2022 - Wiley Online Library
In the modern world, the security of the digital image is vital due to the frequent
communication of digital products over the open network. Accelerated advancement of …

Enhancing Image Data Security with Chain and Non-Chain Galois Ring Structures

MU Safdar, T Shah, A Ali - Mathematics and Computers in Simulation, 2024 - Elsevier
The local ring-based cryptosystem is built upon the core mathematical operations of the
algebraic structure of local rings, which provides a significant advantage in ensuring security …

Vigenère Implemented in Two Chaotic Feistel Laps for Medical Images Encryption Followed by Genetic Mutation

A Abdellah, M Jarjar, A Benazzi, A Jarjar… - … Conference on Artificial …, 2022 - Springer
In this work, we will propose a new method for medical image encryption based on Vigenère
injection into two greatly improved Feistel rounds, followed by a chaotic mutation applied to …

Selective medical image encryption based on 3D Lorenz and Logistic system

M Lyle, P Sarosh, SA Parah - Multimedia Tools and Applications, 2024 - Springer
Medical images contain very sensitive and confidential information about the patient and are
huge in terms of size. Therefore, there is a need to develop encryption schemes that reduce …

FPGA implementation of improved security approach for medical image encryption and decryption

A Hafsa, M Gafsi, J Malek… - Scientific …, 2021 - Wiley Online Library
Securing medical images is a great challenge to protect medical privacy. An image
encryption model founded on a complex chaos‐based Pseudorandom Number Generator …