[HTML][HTML] Privacy-preserving biometrics image encryption and digital signature technique using Arnold and ElGamal

Y Qin, B Zhang - Applied Sciences, 2023 - mdpi.com
The scientific study of privacy-preserving biometrics, represented by the palmprint, face, and
iris, has grown tremendously. That being said, there has not been much attention paid to the …

[HTML][HTML] A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application

R Flores-Carapia, VM Silva-García… - Applied Sciences, 2023 - mdpi.com
Images with sensitive content require encryption for storage and transmission. Symmetric
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …

Novel asymmetrical color image encryption using 2D sine-power coupling map

J Tang, M Lu, Z Zhang, X Huang, T Huang, J Wang - Nonlinear Dynamics, 2024 - Springer
Recently, many existing image encryption schemes suffer from security vulnerabilities due to
system key leakage. In response to this issue, this paper proposes a novel asymmetric …

Deep learning-based encryption for secure transmission digital images: A survey

S Rohhila, AK Singh - Computers and Electrical Engineering, 2024 - Elsevier
With the innovation of high-throughput big data storage technology and the construction of
digital information systems in media applications, images are the common and most popular …

A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy

VM Silva-García, R Flores-Carapia… - Entropy, 2024 - mdpi.com
Today, safeguarding sensitive content through encryption is crucial. This work presents a
hybrid cryptosystem for images that employs both asymmetric and symmetric encryption …

On the Layout-Oriented Investigation of Power Attack Hardness of Spintronic-Based Logic Circuits

P Iranfar, A Amirany, MH Moaiyeri, K Jafari - Circuits, Systems, and Signal …, 2024 - Springer
High leakage power consumption has become one of the main concerns of data security
protection with CMOS device scaling. Spintronic technology is one of the efficient solutions …

Performance of Cipher Image Transmission in Free Space Optics Under Foggy Weather

SA Abd El-Mottaleb, AG Mohamed, A Chehri… - IEEE …, 2023 - ieeexplore.ieee.org
This paper proposes a new cipher image transmission system in free space optics system
(FSO). A secure and effective image cryptosystem algorithm based on the Choquet fuzzy …

Local bit-level image encryption algorithm based on one dimensional zero excluded chaotic map

X Feng, G Han, F Yan, D Shen, Z Pang, Q Li - Physica Scripta, 2024 - iopscience.iop.org
The exchange of digital images on the internet has become more convenient, but it has also
led to increasing security concerns. Image encryption differs from text encryption, as inherent …

A hybrid scheme using hyper-chaotic system and elliptic curve cryptography for image encryption

I Chaouch, A Naanaa, S ElAsmi - Multimedia Tools and Applications, 2024 - Springer
This paper offers an efficient hybrid image encryption algorithm based on an elliptic curve
cryptography (ECC), skew tent map and hyperchaotic system in order to enhance the …

A secure authenticated image encryption scheme based on elliptic curve cryptography

C Jnana Ramakrishna… - … Journal of Computers …, 2024 - Taylor & Francis
The picture archiving and communication system is a powerful mechanism to store and
securely transmit images and reports. The development of a cost-effective encryption …