Region of interest-based medical image encryption technique based on chaotic S-boxes

SS Jamal, MM Hazzazi, MF Khan, Z Bassfar… - Expert Systems with …, 2024 - Elsevier
Block cipher has been one of the most reliable options by which data security is achieved.
The strength of block cipher against various attacks is purely dependent on its confusion …

Construction and optimization of dynamic S-boxes based on gaussian distribution

AR Alharbi, SS Jamal, MF Khan, MA Gondal… - IEEE …, 2023 - ieeexplore.ieee.org
Block ciphers are widely used for securing data and are known for their resistance to various
types of attacks. The strength of a block cipher against these attacks often depends on the S …

A New S-Box Design Approach for SNOW 3G Using the POS of Power Functions

P Peri, J Dutta, R Malkuchi - 2024 16th International …, 2024 - ieeexplore.ieee.org
In this paper, we propose “S-POS”, an 8*8 S-box as a more secure alternative to Snow 3G's
existing S2 S-box. By leveraging the product of the sum (POS) of power functions in GF(2^8) …

A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps

M Ramzan, MF Khan - International Journal of Advanced …, 2023 - search.proquest.com
The fundamental objectives of a steganographic technique are to achieve both robustness
and high-capacity for the hidden information. This paper proposes a steganographic …

Optimization of SM4 Encryption Algorithm for Power Metering Data Transmission.

YM Zhang, J Xu, YT Zhao, QC Liu… - International Journal of …, 2024 - search.ebscohost.com
This study focuses on enhancing the security of the SM4 encryption algorithm for power
metering data transmission by employing hybrid algorithms to optimize its substitution box (S …