Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover

M Gupta, KK Gupta, PK Shukla - Multimedia Tools and Applications, 2021 - Springer
In the current era, the majority of communication in IoT-enabled devices, such as
smartphones, is now done through images. To shield the images from invaders, a reliable …

Session key based fast, secure and lightweight image encryption algorithm

M Gupta, KK Gupta, PK Shukla - Multimedia Tools and Applications, 2021 - Springer
Nowadays, most of the communications in IoT enabled devices are done in the form of
images. To protect the images from intruders, there is a need for a secure encryption …

An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for internet of multimedia things

M Gupta, KK Gupta, MR Khosravi, PK Shukla… - Wireless Personal …, 2021 - Springer
Due to the increasing demand for IoMT applications in numerous fields such as healthcare,
smart city, smart grids, industrial internet, etc. The privacy and security become a major issue …

New compression–encryption algorithm using chaos-based dynamic session key

E Setyaningsih, R Wardoyo, AK Sari - International Journal on Smart …, 2018 - sciendo.com
Abstract This research proposes New Compression–Encryption Algorithm Using Chaos-
Based Dynamic Session Key (CEA-CBDSK) to encrypt image data. CEA-CBDSK consists of …

A new efficient and configurable image encryption structure for secure transmission

WI Khedr - Multimedia Tools and Applications, 2020 - Springer
This paper presents a novel robust symmetric image encryption structure (IES) based on
stream ciphers and perceptual hashing for secure image transmission over public networks …

An ultra robust session key based image cryptography

HN Khan, A Chaudhuri, A Das, A Chaudhuri - Microsystem Technologies, 2020 - Springer
Increased use of internet demands substantial protection for secret image file from any
adversary, specifically during transmission. In the field of cryptography there are two role …

An efficient image encryption technique based on two-level security for internet of things

M Gupta, VP Singh, KK Gupta, PK Shukla - Multimedia Tools and …, 2023 - Springer
This paper proposes an efficient image encryption method based on a hybrid of
watermarking and cryptographic techniques. It is based on two-level security for the secure …

[PDF][PDF] An ethical approach of block based image encryption using chaotic map

K Gupta, R Gupta, R Agrawal… - International Journal of …, 2015 - researchgate.net
In present era all the multimedia communication is done over open network such as Images,
Audio, Videos, Text etc, so the security is also a major concern. In this research we proposed …

[PDF][PDF] Efficient hybrid image cryptosystem using ECC and chaotic map

K Gupta, S Silakari - Int. J. Comput. Appl, 2011 - Citeseer
Encryption is used to securely transmit data in open networks. Each type of data has its own
features; therefore different techniques should be used to protect confidential image data …

A chaotic permutation and diffusion based image encryption algorithm for secure communications

B Mondal, P Kumar, S Singh - Multimedia Tools and Applications, 2018 - Springer
In this digital era, a huge amount of digital data is being generated, transmitted, and stored
over the network. Images are widely searched, shared and uploaded which make them …