Digital image encryption using elliptic curve cryptography: A review

M Habek, Y Genc, N Aytas, A Akkoc… - … Congress on Human …, 2022 - ieeexplore.ieee.org
Today, digital images are used in many different applications. They can be social media
applications or critical applications such as military and medical. However, cyber attacks or …

A novel multiple grayscale image encryption method based on 3D bit-scrambling and diffusion

M Demirtaş - Optik, 2022 - Elsevier
Since a large number of digital images are shared widely in our daily life, the demand and
need for multiple-image encryption algorithms are increasing to ensure the security of the …

An integrated image encryption scheme based on elliptic curve

I Khalid, T Shah, SM Eldin, D Shah, M Asif… - IEEE …, 2022 - ieeexplore.ieee.org
Due to the extensive demand for digital images across all fields, the security of multimedia
data over insecure networks is a challenging task. The majority of the existing modern …

A chaotic image encryption scheme based on multi-directional confusion and diffusion operations

M Hussain, N Iqbal, Z Bashir - Journal of information security and …, 2022 - Elsevier
A careful perusal of the literature regarding the image encryption algorithms indicates that
many research articles based on pixel swapping operations in the horizontal and vertical …

An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map

N Iqbal, I Hussain, MA Khan, S Abbas… - Multimedia Tools and …, 2023 - Springer
Researchers have paid increasing attention towards the usage of scrambled image for the
image encryption in recent years. 2D and 3D scrambled images have already been …

Multi-layer security based multiple image encryption technique

S Sabir, V Guleria - Computers and Electrical Engineering, 2023 - Elsevier
This paper designs a novel multiple image encryption technique utilizing affine Hill cipher
(AHC), reality-preserving two-dimensional discrete fractional Hartley transform (RP2DFrHT) …

Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm

M Hussain, N Iqbal, Z Bashir - Cluster Computing, 2024 - Springer
Traditionally, keys are generated using the hash value of the given image in the image
cryptography to boost the security effects. The keys have been sent to the concerned …

[HTML][HTML] A hybrid logistic DNA-based encryption system for securing the Internet of Things patient monitoring systems

R Ettiyan, V Geetha - Healthcare Analytics, 2023 - Elsevier
Abstract The Internet of Things (IoT) plays a major role in healthcare, and high-end
encryption schemes are needed to ensure data integrity and privacy in this industry. The …

FOPBIE: Multi-image cipher based on the random walk of fleet of pawns on the large hypothetical chessboard and chaotic system

M Akram, S Ali, J Alqahtani, N Iqbal, A Alqahtani… - Plos one, 2024 - journals.plos.org
In the last two decades or so, a large number of image ciphers have been written. The
majority of these ciphers encrypt only one image at a time. Few image ciphers were written …

Medical Image Encryption through Chaotic Asymmetric Cryptosystem

TR Ningthoukhongjam, SD Heisnam… - IEEE …, 2024 - ieeexplore.ieee.org
In the era of digital advancements, safeguarding medical data holds significant importance.
This article introduces a novel approach to encrypting images through public-key encryption …