Exploiting flexible and secure cryptographic technique for multi-dimensional image based on graph data structure and three-input majority gate

Y Sha, J Mou, S Banerjee… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
The emergence of the Industrial Internet of Things (IIoT) has greatly improved the efficiency
of manufacturing, but it also faces significant security challenges during the operational …

Low-cost multiclass-image encryption based on compressive sensing and chaotic system

Y Sha, J Mou, S Banerjee, H Jahanshahi, Y Cao - Nonlinear Dynamics, 2023 - Springer
In this paper, a compressible and low-cost cryptography system is investigated based a new
memristor system for Internet of multimedia things to acquire and transmit multiclass-image …

Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system

NAES Mohamed, A Youssif, HAG El-Sayed - Complexity, 2022 - Wiley Online Library
Topic of quantum chaos has begun to draw increasing attention in recent years. So, to
ensure the security of digital image, an image encryption algorithm based on combining a …

A survey of image encryption algorithms

QH Makki, AM Abdalla… - … Conference on Information …, 2021 - ieeexplore.ieee.org
Data and image security is one of the most important aspects of information storage as well
as the massive and still expanding internet. The frequent use of images of various types …

Watermarking techniques for three-dimensional (3D) mesh models: a survey

M Narendra, ML Valarmathi, LJ Anbarasi - Multimedia systems, 2022 - Springer
Multimedia data play an important role in many areas such as business, medicine, and
entertainment. Multimedia contents are often vulnerable to malicious interventions due to the …

Three Dimensional Objects Encryption Algorithms: A Review

M Mizher, S Hamdan, M Mizher… - 2023 International …, 2023 - ieeexplore.ieee.org
Three-dimensional object encryption involves converting a 3D object into a secure and
encrypted format to restrict access to authorized individuals. The primary objective is to …

[PDF][PDF] 3D Content Encryption Using Multi-Level Chaotic Maps

NA Ali, AMS Rahma, SH Shaker - Iraqi Journal of Science, 2023 - iasj.net
Nowadays, 3D content is becoming an essential part of multimedia applications, when the
3D content is not protected, hackers may attack and steal it. This paper introduces a …

A simple chaotic system using signum function

BE Tatlıcıoğlu - Mathematics and Computers in Simulation, 2024 - Elsevier
Abstract Starting from Lorenz System, a simpler system using signum function was obtained,
which shows chaotic behavior. The conditions for stability were explained. Lyapunov and …

[PDF][PDF] Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator.

NA Ali, AMS Rahma, SH Shaker - International Journal of …, 2022 - researchgate.net
The increasing 3D model applications in various areas of life and widespread use like
industry leads to 3D models being stolen and attacked by hackers; therefore, 3D model …

Utilizing Quality Measures in Evaluating Image Encryption Methods

AA Tamimi, AM Abdalla, MM Abdallah - … from IPCV'20, HIMS'20, BIOCOMP' …, 2021 - Springer
The metrics or measures used in evaluating image quality usually serve applications that
aim at enhancing image appearance or at preventing the image quality from degrading after …