PSO-based image encryption scheme using modular integrated logistic exponential map

O Kocak, U Erkan, A Toktas, S Gao - Expert Systems with Applications, 2024 - Elsevier
Image encryption (IE) has been essential for internet-based storing and transferring in recent
years. Effective chaotic systems play a crucial role in IE schemes which widely depend on …

A class of 2n+ 1 dimensional simplest Hamiltonian conservative chaotic systems and fast image encryption schemes

X Kong, F Yu, W Yao, C Xu, J Zhang, S Cai… - Applied Mathematical …, 2024 - Elsevier
Compared with dissipative systems, conservative systems do not have attractors, thus they
can better cope with the security risks brought by phase space reconstruction. In this paper …

A robust bit-level image encryption based on Bessel map

A Toktas, U Erkan, S Gao, C Pak - Applied Mathematics and Computation, 2024 - Elsevier
A chaotic map plays a critical role in image encryption (IME). The map used to generate
chaotic sequences should perform high dynamic characteristics. In this study, a new chaotic …

Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions

F Toktas, U Erkan, Z Yetgin - Expert Systems with Applications, 2024 - Elsevier
The security of chaos-based Image Encryption (IE) algorithms inherently depends on the
permutation and diffusion strategy of the algorithm and the dynamic performance of chaotic …

Dynamics analysis and image encryption application of Hopfield neural network with a novel multistable and highly tunable memristor

W Yao, J Liu, Y Sun, J Zhang, F Yu, L Cui, H Lin - Nonlinear Dynamics, 2024 - Springer
Building artificial neural network models and studying their dynamic behaviors is extremely
important from both a theoretical and practical standpoint due to the rapid advancement of …

Medical image encryption based on Josephus scrambling and dynamic cross-diffusion for patient privacy security

Z Zhang, J Tang, F Zhang, T Huang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, smart healthcare mode has been gradually maturing with the evolution of
Internet cloud computing technology. However, due to the open and shared features of the …

Image encryption algorithms: A survey of design and evaluation metrics

Y Alghamdi, A Munir - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Ensuring confidentiality and privacy is critical when it comes to sharing images over
unsecured networks such as the internet. Since widely used and secure encryption …

Design, hardware implementation, and application in video encryption of the 2D memristive cubic map

S Gao, HHC Iu, M Wang, D Jiang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Chaos systems find extensive applications in cryptography and pseudorandom number
generation due to their ability to generate pseudo-random signals. This article focuses on …

Temporal action segmentation for video encryption

S Gao, HHC Iu, J Mou, U Erkan, J Liu, R Wu… - Chaos, Solitons & …, 2024 - Elsevier
Videos contain temporal information, enabling them to capture the dynamic changes of
actions and provide richer visual effects. Traditional video encryption methods involve …

Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion

C Li, Y Zhang, H Li, Y Zhou - The Visual Computer, 2024 - Springer
This paper presents an image encryption scheme with data and appearance security, by
adopting inter-intra-block scrambling and weighted diffusion. The 2D robust hyper-chaotic …