A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

Color image encryption using orthogonal Latin squares and a new 2D chaotic system

Z Hua, Z Zhu, Y Chen, Y Li - Nonlinear Dynamics, 2021 - Springer
Recently, many image encryption schemes have been developed using Latin squares.
When encrypting a color image, these algorithms treat the color image as three greyscale …

[HTML][HTML] Cross-plane colour image encryption using a two-dimensional logistic tent modular map

Z Hua, Z Zhu, S Yi, Z Zhang, H Huang - Information Sciences, 2021 - Elsevier
Chaotic systems are suitable for image encryption owing to their numerous intrinsic
characteristics. However, chaotic maps and algorithmic structures employed in many …

Enabling artificial intelligence of things (AIoT) healthcare architectures and listing security issues

AA Pise, KK Almuzaini, TA Ahanger… - Computational …, 2022 - Wiley Online Library
A significant study has been undertaken in the areas of health care and administration of
cutting‐edge artificial intelligence (AI) technologies throughout the previous decade …

A new efficient medical image cipher based on hybrid chaotic map and DNA code

R Guesmi, MAB Farah - Multimedia tools and applications, 2021 - Springer
In this paper, we propose a novel medical image encryption algorithm based on a hybrid
model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and a new …

[HTML][HTML] Dual-domain image encryption in unsecure medium—a secure communication perspective

H Mahalingam, T Veeramalai, AR Menon… - Mathematics, 2023 - mdpi.com
With the growing demand for digitalization, multimedia data transmission through wireless
networks has become more prominent. These multimedia data include text, images, audio …

Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis

S Pankaj, M Dua - Information Security Journal: A Global …, 2024 - Taylor & Francis
In the past two decades, we have seen the proliferation of Internet and its applications. The
information exchange happens via images, videos, texts, audio clips, etc. Medical experts …

[Retracted] An Improved Secure Key Generation Using Enhanced Identity‐Based Encryption for Cloud Computing in Large‐Scale 5G

RK Gupta, KK Almuzaini, RK Pateriya… - Wireless …, 2022 - Wiley Online Library
The demand of cloud computing and 5G networks has increased in the current scenario due
to their attractive features and also the security related to the data over the cloud. In the …

Image encryption algorithm based on logistic and two-dimensional lorenz

T Li, B Du, X Liang - Ieee Access, 2020 - ieeexplore.ieee.org
In recent years, experts and scholars in the field of information security have attached great
importance to the security of image information. They have proposed many image …

[HTML][HTML] Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation

Z Liang, Q Qin, C Zhou, N Wang, Y Xu, W Zhou - PloS one, 2021 - journals.plos.org
Current image encryption methods have many shortcomings for the medical image
encryption with high resolution, strong correlation and large storage space, and it is difficult …