[HTML][HTML] Image encryption based on independent component analysis and arnold's cat map

NAM Abbas - Egyptian informatics journal, 2016 - Elsevier
Security of the multimedia data including image and video is one of the basic requirements
for the telecommunications and computer networks. In this paper, a new efficient image …

[HTML][HTML] When cryptography stops data science: strategies for resolving the conflicts between data scientists and cryptographers

BF Saeed, IR Azadeh - Data Science and Management, 2024 - Elsevier
The advent of the digital era and computer-based remote communications has significantly
enhanced the applicability of various sciences over the past two decades, notably data …

Image encryption techniques: a selected review

S Kaur, S Kaur - ZENITH International Journal of …, 2012 - indianjournals.com
In present times, the image encryption is becoming most popular area in research. Because
the protection or we can say security of images is done with the help of image encryption in …

A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform

S Koppu, VM Viswanatham - Modelling and Simulation in …, 2017 - Wiley Online Library
An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT‐
Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of …

Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach

P Praveenkumar, R Amirtharajan, K Thenmozhi… - … -International Journal of …, 2015 - Elsevier
The significance of cipher communication against hackers has been strongly felt by the
cyber lawmakers. In this direction a yet another double-edged knife cipher methodology …

A novel and secure hybrid iwd-mask algorithm for enhanced image security

R Tandon, PK Gupta - Recent Advances in Computer Science …, 2021 - ingentaconnect.com
Background: Most of the work has been done using DES, AES, and MAES for key
generation in the image encryption. These algorithms provide better results for text based …

[PDF][PDF] Inbuilt image encryption and steganography security solutions for wireless systems: a survey

P Praveenkumar, K Thenmozhi… - Research Journal of …, 2017 - researchgate.net
It is increasingly difficult to ensure the sharing of secret information due to uncontrolled
technology explosion. In particular, the field of communication engineering has undergone a …

A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher

M Rani, S Kumar - … on green computing and internet of things …, 2015 - ieeexplore.ieee.org
This research gives a novel approach for fast encryption of images using chaotic maps and
pixel shuffling using modified RC4 stream cipher algorithm. In this, the given image will be …

Modified MASK algorithm for image encryption

HG Wali, NC Iyer - Procedia Computer Science, 2016 - Elsevier
AES a symmetric block cipher is suitable for high speed application. The throughput as one
of the bottleneck for huge data size such as image. Another symmetric block cipher MASK, a …

A Secured Data Storage Mechanism Using Baye's Theorem and Matrix for Effective Data Communication in Cloud

J Nithisha, J Jayarin - Journal of Internet Technology, 2021 - jit.ndhu.edu.tw
In cloud, the data security is playing major role for ensuring the drastic improvement of the
number of cloud users. For this purpose, many secured data storage mechanisms are …