A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing

L Zhu, D Jiang, J Ni, X Wang, X Rong, M Ahmad… - Signal Processing, 2022 - Elsevier
In order to safely and covertly protect the digital image information during public channel
transmission and localized storage, a stable image visually secure encryption algorithm by …

Chaos and compressive sensing based novel image encryption scheme

JS Khan, SK Kayhan - Journal of Information Security and Applications, 2021 - Elsevier
Out of various cryptographic attacks, Chosen-Plaintext Attack (CPA) is one of the most
powerful and widely used attack on encrypted images. In order to efficiently resist such a …

2D Logistic-Adjusted-Chebyshev map for visual color image encryption

L Liu, D Jiang, X Wang, X Rong, R Zhang - Journal of Information Security …, 2021 - Elsevier
With the increasing requirements of the performance in secure communication filed based
on chaos, chaotic systems have been gradually developed into higher dimensions. Because …

A selective image encryption algorithm based on a chaotic model using modular sine arithmetic

X Wang, N Guan, P Liu - Optik, 2022 - Elsevier
In this paper, an effective sine modular arithmetic chaotic model is proposed, and applied to
image encryption. The new system is a combination of module operation, Sine map and …

A novel hash function based on a chaotic sponge and DNA sequence

M Alawida, A Samsudin, N Alajarmeh, JS Teh… - IEEE …, 2021 - ieeexplore.ieee.org
Many chaos-based hash functions have convoluted designs that are not based on proper
design principles, complicating the verification of security claims. We address this problem …

Integration of spatial and frequency domain encryption for digital images

A Shafique, MM Hazzazi, AR Alharbi, I Hussain - IEEE Access, 2021 - ieeexplore.ieee.org
Transmission of multimedia data such as images, videos, and audio over the Internet is risky
due to cyberattacks. To overcome the security issues, several encryption schemes are …

Energy theft detection in smart grids with genetic algorithm-based feature selection

M Umair, Z Saeed, F Saeed, H Ishtiaq… - Computers …, 2022 - open-access.bcu.ac.uk
As big data, its technologies, and application continue to advance, the Smart Grid (SG) has
become one of the most successful pervasive and fixed computing platforms that efficiently …

An image encryption algorithm based on multi-layered chaotic maps and its security analysis

E Güvenoğlu - Connection Science, 2024 - Taylor & Francis
This study introduces a novel symmetric image encryption algorithm that employs a multi-
layered architecture of chaotic maps, incorporating both confusion and diffusion …

Applying 3DES to chaotic synchronization cryptosystems

FH Hsiao - IEEE Access, 2021 - ieeexplore.ieee.org
The triple data encryption standard (3DES) has played a key role in the field of data
encryption over the past few decades. However, the ciphertext's security is decreased by the …

Image Encryption Algorithm Based on 2D-Sine-Cosine Chaotic Mapping and Compression Sensing

J Shen, Q Zhou, Q Wang, Y Gu - 2024 43rd Chinese Control …, 2024 - ieeexplore.ieee.org
This paper introduces an image encryption algorithm based on 2D-Sine-Cosine chaotic
mapping and compressed sensing technology. This algorithm introduces a novel 2D-Sine …