Healthcare with datacare—a triangular DNA security

SA Banu, AI Al-Alawi, M Padmaa, PS Priya… - Multimedia Tools and …, 2024 - Springer
One of the fastest-growing industries in recent years has been e-Healthcare. Many
cyberattacks and threats against patient confidentiality exist in electronic health records …

Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm

M Hussain, N Iqbal, Z Bashir - Cluster Computing, 2024 - Springer
Traditionally, keys are generated using the hash value of the given image in the image
cryptography to boost the security effects. The keys have been sent to the concerned …

4D-dynamical system and convolution codes based colored image encryption scheme: information security perception

DS Malik, T Shah - Multimedia Tools and Applications, 2024 - Springer
A novel color image encryption based on permutation and bit-wise exclusive OR (XOR)
operation is introduced in this work. The main objective of the proposed scheme is to …

Cloudsec: A lightweight and agile approach to secure medical image transmission in the cloud computing environment

A Mondal, PS Chatterjee - SN Computer Science, 2024 - Springer
In this paper, we have proposed a novel method CloudSec. It is a lightweight and agile
image encryption method that combines a hashing function, multi-wing chaotic mapping …

An image encryption scheme based on the four-dimensional chaotic system and the mealy finite state machine

X Zhang, G Liu, J Di - Physica Scripta, 2024 - iopscience.iop.org
This paper proposes a four-dimensional hyperchaotic system to overcome the defect of
weak encryption effect due to the simple complexity of low-dimensional chaotic systems in …

Privacy‐preserving in the smart healthcare system using steganography and chaotic functions based on DNA

H Esmaeelzadeh Rostam, H Motameni… - Security and …, 2024 - Wiley Online Library
The smart healthcare system is one of the Internet of Things‐based applications that are
increasingly used nowadays. One of the requirements of this system is privacy‐preserving …

Cryptanalysis of an image encryption algorithm based on cellular automata and chaotic skew tent map

C Deng, Q Wang, S Yu, B Chen, DDU Li - Multimedia Tools and …, 2024 - Springer
In this paper, a security analysis of Image Encryption Algorithm based on Cellular Automata
and Chaotic Skew Tent Map (IEA-CACSTM) is presented. The security of IEA-CACSTM has …

Data Center Secure Communication via DNA Hyperchaotic Encryption

X Wang, C Zhang, W Zeng, Y Luo - Journal of Lightwave …, 2024 - ieeexplore.ieee.org
As data centers continue to grow in size and importance, protecting the security of data
during connectivity becomes critical. In this paper, we propose a deoxyribonucleic acid …

Flexible and energy-efficient crypto-processor for arbitrary input length processing in blockchain-based iot applications

TD Vu, HL Pham, TH Tran… - IEICE Transactions on …, 2024 - search.ieice.org
Blockchain-based Internet of Things (IoT) applications require flexible, fast, and low-power
hashing hardware to ensure IoT data integrity and maintain blockchain network …

[HTML][HTML] Design and performance analysis of secure optical communication system by implementing blowfish cipher algorithm

RA Hussien, SS Radhi, FF Rashid, EN Abdulla… - Results in Optics, 2024 - Elsevier
With the increasing demand for image transmission in various fields including medical,
military and multimedia, the security of information contained on these images has become …