Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol

Z Bashir, MGA Malik, M Hussain, N Iqbal - Multimedia Tools and …, 2022 - Springer
For the asymmetric key, the Diffie Hellman Key (DHK) protocol is very efficient, but
sometimes it is vulnerable against brute force attacks if the parameters are not chosen …

A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

A secure image encryption scheme based on three different chaotic maps

S De, J Bhaumik, D Giri - Multimedia Tools and Applications, 2022 - Springer
In the current decade, chaos based image encryption has distinctly captured a remarkable
position in multimedia data security. In this paper, a hybrid chaos based image encryption …

Simultaneous encryption of multiple images using pseudo-random sequences generated by modified Newton-Raphson technique

A Paul, S Kandar - Multimedia Tools and Applications, 2022 - Springer
A multiple image encryption using pseudo random (PR) sequence is proposed in this article.
A non-chaotic technique pillared on modified Newton-Raphson method is applied to …

[HTML][HTML] IoT based medical image encryption using linear feedback shift register–Towards ensuring security for teleradiology applications

S John, SN Kumar - Measurement: Sensors, 2023 - Elsevier
Telemedicine gains prominence in today's scenario and image security plays a vital role in
the healthcare sector for authenticating data transfer. Medical data, when transferred …

PixJS: A novel chaos‐based approach for image encryption

R Tuli, H Soneji, S Vahora, P Churi… - Concurrency and …, 2022 - Wiley Online Library
Image encryption has variety of applications in the healthcare, military, e‐commerce, and
education sectors. Along with processing images for various applications, secure storage of …

Performance analysis of a lightweight robust chaotic image re-encryption scheme for 5g heterogeneous networks

A Kakkar, M Singh - Wireless Personal Communications, 2023 - Springer
The 5G networks will require a paradigm shift in how they are constructed, managed and
supervised for better data security performance. Driven by this trend, secured computing, an …

Design and FPGA Implementation of the Henon Chaotic Map for Image Encryption

E Taqieddin, D Mustafa, A Shatnawi… - … on Information and …, 2023 - ieeexplore.ieee.org
Due to the ever increasing usage of multimedia content sharing and the inherent nature of
the insecure links used for transmission, it is quite necessary to provide a fast and secure …

3D Hyperchaotic Medical Image Encryption for Teleradiology Applications

BM Issac, SN Kumar, S Khan - International Conference on ICT for Digital …, 2024 - Springer
The increasing reliance on teleradiology for remote medical image transmission
necessitates robust security measures to safeguard patient information. This paper …

Hardness of Approximation for Langton's Ant on a Twisted Torus

T Hagiwara, T Tsukiji - Algorithms, 2020 - mdpi.com
Langton's ant is a deterministic cellular automaton studied in many fields, artificial life,
computational complexity, cryptography, emergent dynamics, Lorents lattice gas, and so …