RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher

MA Lone, S Qureshi - Optik, 2022 - Elsevier
In this work, we propose a novel color image encryption scheme based on symmetric keys
using the synergistic approach of Arnold transform, 3D logistic chaotic map with XOR …

Encryption scheme for RGB images using chaos and affine hill cipher technique

MA Lone, S Qureshi - Nonlinear Dynamics, 2023 - Springer
A new color image encryption algorithm is presented in this work by invoking a coupled
configuration of the two-dimensional Hénon map, the three-dimensional logistic map with …

[HTML][HTML] A new secure transmission scheme between senders and receivers using HVCHC without any loss

S Almutairi, M Aborokbah - EURASIP Journal on Wireless …, 2019 - Springer
This paper presents a novel secure medical image transmission scheme using hybrid visual
cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale …

12× 12 S-box design and its application to RGB image encryption

T ul Haq, T Shah - Optik, 2020 - Elsevier
Abstract Customarily, 8× 8 S-box is a 16× 16 look up table over Galois field GF 2 8, algebra
over the binary field F 2. A 12× 12 S-box over GF 2 12 is not workable as the computer …

Multi-layer security based multiple image encryption technique

S Sabir, V Guleria - Computers and Electrical Engineering, 2023 - Elsevier
This paper designs a novel multiple image encryption technique utilizing affine Hill cipher
(AHC), reality-preserving two-dimensional discrete fractional Hartley transform (RP2DFrHT) …

Multi-layer security of color image based on chaotic system combined with RP2DFRFT and Arnold transform

DC Mishra, RK Sharma, S Suman, A Prasad - Journal of information …, 2017 - Elsevier
The security system for RGB image information is very critical issue in current time. In this
security system, we have proposed an algorithm for encryption and decryption of RGB …

[HTML][HTML] Trajectory control and image encryption using affine transformation of lorenz system

WS Sayed, AG Radwan, HAH Fahmy… - Egyptian Informatics …, 2021 - Elsevier
This paper presents a generalization of chaotic systems using two-dimensional affine
transformations with six introduced parameters to achieve scaling, reflection, rotation …

A new image encryption technique combining hill cipher method, morse code and least significant bit algorithm

D Nofriansyah, S Defit, GW Nurcahyo… - Journal of Physics …, 2018 - iopscience.iop.org
Cybercrime is one of the most serious threats. Efforts are made to reduce the number of
cybercrime is to find new techniques in securing data such as Cryptography, Steganography …

Application of algebra and chaos theory in security of color images

PN Lone, D Singh - Optik, 2020 - Elsevier
In the current era of digital communication, the security of data transmitted relies heavily on
cryptographic algorithms. Transmission of digital images through an insecure channel is …

[HTML][HTML] A new efficient TKHC-based image sharing scheme over unsecured channel

ME Hodeish, L Bukauskas, VT Humbe - Journal of King Saud University …, 2022 - Elsevier
The major problems of Visual Secret Sharing (VSS) are the pixel expansion and lossy
recovery. The former creates large-sized shared images and makes their handling, storage …