When an attacker meets a cipher-image in 2018: A year in review

C Li, Y Zhang, EY Xie - Journal of Information Security and Applications, 2019 - Elsevier
This paper aims to review the encountered technical contradictions when an attacker meets
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …

An image encryption method based on elliptic curve elgamal encryption and chaotic systems

Y Luo, X Ouyang, J Liu, L Cao - IEEE Access, 2019 - ieeexplore.ieee.org
Due to the potential security problem about key management and distribution for the
symmetric image encryption schemes, a novel asymmetric image encryption method is …

A chaotic image encryption scheme based on genetic central dogma and KMP method

Y Sha, S Bo, C Yang, J Mou… - International Journal of …, 2022 - World Scientific
In this paper, an image cryptosystem based on genetic central dogma (GCD), Knuth–Morria–
Pratt (KMP) algorithm and a chaotic system is developed. The KMP algorithm is firstly used …

Multiple grayscale image encryption using cross-coupled chaotic maps

KAK Patro, A Soni, PK Netam, B Acharya - Journal of Information Security …, 2020 - Elsevier
This paper proposes a newly developed multiple grayscale image encryption scheme using
cross-coupling of two Piece-wise Linear Chaotic Maps (PWLCM). In this scheme, cross …

Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding

X Zhang, Y Hu - Optics & Laser Technology, 2021 - Elsevier
Lots of digital images from different fields distributed in Internet are exposed to various risks,
such as the content leakage, illegal access and use. To solve the problems of weak security …

On symmetric color image encryption system with permutation-diffusion simultaneous operation

L Huang, S Cai, X Xiong, M Xiao - Optics and Lasers in Engineering, 2019 - Elsevier
In the traditional image encryption systems, the permutation-diffusion operation is often
conducted in two essentially separable or independent steps, which appears not only to be …

A new one-dimensional chaotic system with applications in image encryption

X Wang, Y Li, J Jin - Chaos, Solitons & Fractals, 2020 - Elsevier
This paper presents a new and improved one-dimensional sinusoidal chaotic system (I1DS).
After experimental verification, its chaotic performance has a larger range of chaotic …

A review on queue management algorithms in large networks

MM Hamdi, HF Mahdi, MS Abood… - IOP Conference …, 2021 - iopscience.iop.org
The efficiency of Transmission Control Protocol (TCP) is significantly influenced by
Congestion Control. Many scientists have widely researched and suggested several …

An efficient colour image encryption scheme based on 1-D chaotic maps

KAK Patro, B Acharya - Journal of Information Security and Applications, 2019 - Elsevier
Nowadays, internet is the medium through which people are sharing digital images.
However, security is an issue in sharing of those images. Encryption techniques play an …

An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos

C Li, X Yang - Optik, 2022 - Elsevier
Aiming at low security of traditional encryption methods, a new image encryption algorithm
based on discrete fractional wavelet transform (DFRWT) and quantum Logistic mapping is …