L Zhu, D Jiang, J Ni, X Wang, X Rong, M Ahmad - Information Sciences, 2022 - Elsevier
Aiming at the deficiencies of existing image compression-encryption algorithms, such as unstable reconstruction performance and weak crypticity, a novel visually secure image …
H Li, S Yu, W Feng, Y Chen, J Zhang, Z Qin, Z Zhu… - Entropy, 2023 - mdpi.com
Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain …
C Wang, L Song - Information Sciences, 2023 - Elsevier
In this paper, we propose a novel image encryption scheme based on a chaotic system and compressed sensing for multiple application scenarios. It is a dedicated scheme for JPEG …
Image encryption schemes that use substitution box (S-box) generators, and dynamic S- boxes in particular, have attracted wide research interest recently. Typically, the security of S …
Traditional image encryption schemes turn images with rich visual contents into meaningless noise-like ones. This assures privacy security at the expense of visual …
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to improve the security against modern computational attacks. However …
W Feng, J Zhang, Y Chen, Z Qin, Y Zhang… - Expert Systems with …, 2024 - Elsevier
Recently, to offer better protection for images, new image encryption (IE) algorithms have been continuously proposed. However, these algorithms still exhibit some problems, such …
The quality of encryption is dependent on the complexity of the confusion-diffusion pattern and the quality of the keystream employed. To enhance complexity and randomness, this …
JIM Bezerra, G Machado, A Molter, RI Soares… - Chaos, Solitons & …, 2023 - Elsevier
The constant increase of devices connected to the internet and the development and spread of technologies such as 5G leads to substantial growth in data-sharing over non-secure …