[HTML][HTML] Cosine-transform-based chaotic system for image encryption

Z Hua, Y Zhou, H Huang - Information Sciences, 2019 - Elsevier
Chaos is known as a natural candidate for cryptography applications owing to its properties
such as unpredictability and initial state sensitivity. However, certain chaos-based …

A new hybrid digital chaotic system with applications in image encryption

M Alawida, A Samsudin, JS Teh, RS Alkhawaldeh - Signal Processing, 2019 - Elsevier
Image encryption provides confidentiality to images by transforming them into
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …

A fast image encryption algorithm based on compressive sensing and hyperchaotic map

Q Xu, K Sun, C Cao, C Zhu - Optics and Lasers in Engineering, 2019 - Elsevier
In this paper, we propose a new two-dimensional Sine improved Logistic iterative chaotic
map with infinite collapse (ICMIC) modulation map (2D-SLIM) based on the improved two …

An image compression and encryption algorithm based on chaotic system and compressive sensing

L Gong, K Qiu, C Deng, N Zhou - Optics & Laser Technology, 2019 - Elsevier
For a linear image encryption system, it is vulnerable to the chosen-plaintext attack. To
overcome the weakness and reduce the correlation among pixels of the encryption image …

Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications

S Thakur, AK Singh, SP Ghrera, M Elhoseny - Multimedia tools and …, 2019 - Springer
In this paper, we present a robust and secure watermarking approach using transform
domain techniques for tele-health applications. The patient report/identity is embedding into …

An image encryption scheme based on hybridizing digital chaos and finite state machine

M Alawida, JS Teh, A Samsudin - Signal Processing, 2019 - Elsevier
Image encryption protects visual information by transforming images into an
incomprehensible form. Chaotic systems are used to design image ciphers due to properties …

An optical image compression and encryption scheme based on compressive sensing and RSA algorithm

L Gong, K Qiu, C Deng, N Zhou - Optics and Lasers in Engineering, 2019 - Elsevier
Most of the image encryption algorithms are the private-key cryptosystem, in which the
encryption process and the decryption process employ the same keys. To enhance the …

Image encryption using Josephus problem and filtering diffusion

Z Hua, B Xu, F Jin, H Huang - Ieee Access, 2019 - ieeexplore.ieee.org
Image encryption is an efficient visual technology to protect private images. This paper
develops an image encryption algorithm utilizing the principles of the Josephus problem and …

On symmetric color image encryption system with permutation-diffusion simultaneous operation

L Huang, S Cai, X Xiong, M Xiao - Optics and Lasers in Engineering, 2019 - Elsevier
In the traditional image encryption systems, the permutation-diffusion operation is often
conducted in two essentially separable or independent steps, which appears not only to be …

[HTML][HTML] An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map

P Ramasamy, V Ranganathan, S Kadry… - Entropy, 2019 - mdpi.com
Nowadays, the images are transferred through open channels that are subject to potential
attacks, so the exchange of image data requires additional security in many fields, such as …