An improved DWT-SVD domain watermarking for medical information security

A Anand, AK Singh - Computer Communications, 2020 - Elsevier
Exchange of patient record over network required a technique to guarantee security and
privacy for tele-health services. This paper presents an improved watermarking technique …

A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme

A Mansouri, X Wang - Information Sciences, 2020 - Elsevier
With the rapid growth of data transmission technology, image encryption is becoming a
widely discussed topic in the field of information security. In this paper, we introduce a novel …

An effective image encryption algorithm based on compressive sensing and 2D-SLIM

Q Xu, K Sun, S He, C Zhu - Optics and Lasers in Engineering, 2020 - Elsevier
This paper presents an image encryption algorithm based on the compressive sensing and
a hyperchaotic map, which includes the permutation, compression and diffusion processes …

Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system

SS Yu, NR Zhou, LH Gong, Z Nie - Optics and Lasers in Engineering, 2020 - Elsevier
To increase the robustness against common attacks, a novel image encryption algorithm is
proposed based on the phase-truncated short-time fractional Fourier transform (PTSTFrFT) …

Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application

F Yang, J Mou, C Ma, Y Cao - Optics and lasers in engineering, 2020 - Elsevier
The fractional-order chaotic systems have characteristics of the all chaotic systems,
however, the improper fractional-order chaotic systems have more complexity random …

A privacy-preserving cryptosystem for IoT E-healthcare

R Hamza, Z Yan, K Muhammad, P Bellavista… - Information …, 2020 - Elsevier
Privacy preservation has become a prerequisite for modern applications in the cloud, social
media, Internet of things (IoT), and E-healthcare systems. In general, health and medical …

Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map

M Kaur, D Singh, K Sun, U Rawat - Future Generation Computer Systems, 2020 - Elsevier
The secure key generation is the predominant requirement of an image encryption. Chaotic
maps are often considered by the researchers for secure key generation. However, chaotic …

A blockchain-based secure image encryption scheme for the industrial Internet of Things

PW Khan, Y Byun - Entropy, 2020 - mdpi.com
Smart cameras and image sensors are widely used in industrial processes, from the
designing to the quality checking of the final product. Images generated by these sensors …

Designing a 2D infinite collapse map for image encryption

W Cao, Y Mao, Y Zhou - Signal Processing, 2020 - Elsevier
Due to the unpredictability and complexity properties, chaotic maps are widely applied in
security, communication, and system control. Existing one-dimensional (1D) chaotic maps …

A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level

X Wang, Y Wang, X Zhu, C Luo - Optics and Lasers in Engineering, 2020 - Elsevier
This paper proposes a new chaotic image encryption, which is based on the coupled map
lattices (CML system) and DNA diffusion sequences, and it's also a new one-time pad …