Multimedia security using encryption: A survey

KM Hosny, MA Zaki, NA Lashin, MM Fouda… - IEEE …, 2023 - ieeexplore.ieee.org
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …

Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function

B Rahul, K Kuppusamy, A Senthilrajan - Optik, 2023 - Elsevier
In today's world, a substantial number of digital images are conserved and transmitted
through diverse online platforms on a daily basis. Preserving the confidentiality of images is …

Securing dual-channel audio communication with a two-dimensional infinite collapse and logistic map

R Wu, S Gao, HHC Iu, S Zhou, U Erkan… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
To provide robust security measures for audio data during transmission, this article has
developed a novel dual-channel audio encryption scheme based on chaos theory …

New secure and efficient substitution and permutation method for audio encryption algorithm

EA Albahrani, TK Alshekly, SH Lafta - The Journal of Supercomputing, 2023 - Springer
A new substitution and permutation method for the encryption/decryption of two-channel
audio files based on chaotic maps is presented. The proposed scheme's structure depends …

An improved image encryption algorithm using a new byte-shuffled Henon map

M Sharma, RK Ranjan, V Bharti - International Journal of Information …, 2023 - Springer
A new byte-shuffling based enhancement of chaotic maps is proposed. The enhancement,
applied to the two-dimensional Henon map, results in another two-dimensional map-Byte …

Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

B Rahul, K Kuppusamy, A Senthilrajan - Multimedia Tools and …, 2023 - Springer
Today, Internet users who share personal and professional data are concerned about the
safety of the data. Encryption is one way to safeguard sensitive and private data on internet …

[HTML][HTML] Оценка качества матричного маскирования цифровых звуковых данных

ЕК Григорьев, АМ Сергеев - Труды учебных заведений связи, 2023 - cyberleninka.ru
Рассмотрена задача обеспечения конфиденциальности звуковой информации,
передаваемой по каналу связи с пакетной передачей. Анализ предметной области …

[PDF][PDF] CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-TimeMultimedia Transmission.

OS Younes, A Alharbi, A Yasseen… - … Systems Science & …, 2023 - cdn.techscience.cn
Due to their significant correlation and redundancy, conventional block cipher cryptosystems
are not efficient in encrypting multimedia data. Stream ciphers based on Cellular Automata …

A better and robust secure communication using a highly complex hyperchaotic system

JP Singh, AB Sarkar, BK Roy - Iranian Journal of Science and Technology …, 2023 - Springer
Many papers are reported in the literature on applying chaotic/hyperchaotic systems for
secured communication. Very few papers have discussed the robustness and effectiveness …

Quality Analysis of Matrix Masking of Digital Audio Data

EK Grigoriev, AM Sergeev - Proceedings of …, 2023 - journals.rcsi.science
This article considered the guarantee of confidentiality task of audio information transmitted
over a packet communication channel. Domain analysis showed, that in most cases …