Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics

Y Lin, Z Xie, T Chen, X Cheng, H Wen - Expert Systems with Applications, 2024 - Elsevier
The protection of digital image privacy in Big Data environment is a hot issue of increasing
concern. To address the contradiction between efficiency and security for privacy protection …

OSMRD-IE: octal-based shuffling and multi-layer rotational diffusing image encryption using 2D hybrid Michalewicz-Ackley map

U Erkan, A Toktas, S Memis, F Toktas… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The security of a chaos-based image encryption (IE) systems is based upon chaotic map's
performance and the encryption algorithm's permutation and diffusion strategies …

Color image encryption based on 2D hyperchaotic Sine couple map and block scrambling

T Chen, T Huang, Z Zhang, M Lu, J Tang - IEEE Access, 2024 - ieeexplore.ieee.org
In this paper, we propose a novel 2D hyperchaotic Sine couple map (2D-HSCM) and then
the proposed 2D map is analyzed using bifurcation diagrams, attractor trajectory, Lyapunov …

A new image encryption scheme based on fractional order neural network

Y Cao, L Wang, K Wang, X Xu, B Li - IEEE Access, 2024 - ieeexplore.ieee.org
To effectively deal with the complex and changeable network environment and meet the
high standard of information transmission security, this paper designs a convenient and …

Cryptanalyzing an Image Encryption Algorithm Underpinned by 3D-BCNN

K You, P Chen, C Li - IEEE MultiMedia, 2024 - ieeexplore.ieee.org
This article analyzes the security performance of an image encryption algorithm based on a
3-D Boolean convolutional neural network (CNN). The algorithm utilizes the convolutional …

[HTML][HTML] Enhancing internet of things communications: development of a new S-box and multi-layer encryption framework

AR Alharbi, A Aljaedi, A Aljuhni, MK Alghuson… - Journal of King Saud …, 2024 - Elsevier
The growth of IoT applications has revolutionized sectors like security and home automation
but raised concerns about data breaches due to device limitations. This research proposes a …

Chaotic Image Encryption Scheme Based on Improved Z‐Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li‐Fi Approach

SBN Fotso, JH Talla Mbé, WN Atchoffo… - …, 2024 - Wiley Online Library
Image encryption schemes are predominantly software‐based. Only a select few have been
implemented in real‐life communication systems. This paper introduces a novel chaotic …

Enhancing image data security using the APFB model

K Barik, S Misra, LF Sanz, S Chockalingam - Connection Science, 2024 - Taylor & Francis
Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography
recreates a critical function in safeguarding information from potential risks and confirming …

[HTML][HTML] A low-time-consumption image encryption combining 2D parametric Pascal matrix chaotic system and elementary operation

J Lu, J Zhang, D An, D Hao, X Ren, R Zhao - Journal of King Saud …, 2024 - Elsevier
The rapid development of the big data era has resulted in traditional image encryption
algorithms consuming more time in handling the huge amount of data. The consumption of …

[HTML][HTML] A construction method for achieving tunable multi-wing complex chaotic system transformation from 'dart-shaped'to 'circular'

M Yan, X Liu, C Li, J Zhu - Alexandria Engineering Journal, 2024 - Elsevier
To address the limitations of traditional untunable multi-wing chaotic systems in terms of
stability and security, this study proposes a novel method for constructing a tunable multi …