Experimental validation of IoT image encryption scheme based on a 5-D fractional hyperchaotic system and Numba JIT compiler

D Clemente-López, JM Munoz-Pacheco… - Internet of Things, 2024 - Elsevier
In the realm of Internet of Things (IoT) systems, the interconnectivity of physical hardware
devices is a fundamental aspect, and as a result, data exchange assumes a critical role in …

A joint encryption and compression algorithm for multiband remote sensing image transmission

W Cao, X Leng, T Yu, X Gu, Q Liu - Sensors, 2023 - mdpi.com
Due to the increasing capabilities of cybercriminals and the vast quantity of sensitive data, it
is necessary to protect remote sensing images during data transmission with “Belt and …

Image encryption scheme based on orbital shift pixels shuffling with ILM chaotic system

W Ali, C Zhu, R Latif, M Asim, MU Tariq - Entropy, 2023 - mdpi.com
Image encryption techniques protect private images from unauthorized access while they
are being transmitted. Previously used confusion and diffusion processes are risky and time …

Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm

M Hussain, N Iqbal, Z Bashir - Cluster Computing, 2024 - Springer
Traditionally, keys are generated using the hash value of the given image in the image
cryptography to boost the security effects. The keys have been sent to the concerned …

A hybrid medical image cryptosystem based on 4D-hyperchaotic S-boxes and logistic maps

SM Ahmed, H MA Elkamchouchi, A Elfahar… - Multimedia Tools and …, 2024 - Springer
Privacy and confidentiality are essential for any patient-related information, including
medical images. In this paper, a novel image encryption technique for medical images is …

Enhancing Image Data Security with Chain and Non-Chain Galois Ring Structures

MU Safdar, T Shah, A Ali - Mathematics and Computers in Simulation, 2024 - Elsevier
The local ring-based cryptosystem is built upon the core mathematical operations of the
algebraic structure of local rings, which provides a significant advantage in ensuring security …

A Hybrid Image Encryption Scheme based on Chaos and a DPA-Resistant Sbox

M Gholamzadeh, B Khadem - arXiv preprint arXiv:2312.15280, 2023 - arxiv.org
Image encryption is one of the most common and effective methods to secure digital images.
Recently, Khalid M. Hosny presented an image encryption scheme based on 6D hyper …

Computational Approach in Cardiac Arrhythmias to Analyse Potassium (K+) Concentration of Extracellular and Intracellular Fluids Effect in Purkinje Fibre Cell for …

K Pavithra, R Navaneethan - 2022 14th International …, 2022 - ieeexplore.ieee.org
The aim of this study is to analyze synchronisation and coordination of purkinje fibre cells
(PFC) with ventricular myocardium. In that particular focus on potassium (K+) concentration …

A Hybrid Grayscale Image Scrambling Framework Using Block Minimization and Arnold Transform

ST MY, AVN Krishna - 2024 11th International Conference on …, 2024 - ieeexplore.ieee.org
Image disarranging is the process of randomly rearranging picture elements to make the
visibility unreadable and break the link among neighboring elements. Pixel values often …

Tool wear investigation and optimization in milling novel AZ31+ SiC MMMC and comparing the results with as authentic AZ31 alloy

GV Reddy, N Senthilkumar… - 2022 14th International …, 2022 - ieeexplore.ieee.org
The purpose of this work is to analyze and compare the end-mill tool wear during milling of
cast AZ31 and AZ31+ 9% SiC magnesium composites. Powder Metallurgy is used to …