[HTML][HTML] A novel chaos-based permutation for image encryption

M Alawida - Journal of King Saud University-Computer and …, 2023 - Elsevier
Image encryption is an essential method for ensuring confidentiality during transmission on
open channels. Digital images have a high correlation with large redundant data, requiring …

Towards provably secure asymmetric image encryption schemes

NA Azam, J Zhu, U Hayat, A Shurbevski - Information Sciences, 2023 - Elsevier
Image encryption schemes that use substitution box (S-box) generators, and dynamic S-
boxes in particular, have attracted wide research interest recently. Typically, the security of S …

A substitution box generator, its analysis, and applications in image encryption

NA Azam, U Hayat, M Ayub - Signal Processing, 2021 - Elsevier
A substitution box (S-box) is the only non-linear component in many cryptosystems.
Recently, S-box generators have been used intensively in many modern cryptosystems to …

Constructing non-fixed-point maps with memristors

J Ramadoss, A Ouannas, VK Tamba, G Grassi… - The European Physical …, 2022 - Springer
Chaotic maps, memristive maps, and maps with special fixed points have attracted
significant researches recently. We introduce a simple methodology to construct a memristor …

A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical images

KCP Shankar, SP Shyry - Soft Computing, 2023 - Springer
Detection of human diseases is crucial to human life. Medical Imaging helps the medical
practitioner in the process of diagnosis and treatment. Securing a medical image and …

A novel image encryption scheme based on ABC algorithm and elliptic curves

T Haider, NA Azam, U Hayat - Arabian Journal for Science and …, 2023 - Springer
Securing digital images against modern attacks is a hot research topic in the field of
cryptography. Several encryption schemes have been proposed, but either they do not …

A Noise‐Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems

H Aziz, SMM Gilani, I Hussain… - Mathematical …, 2021 - Wiley Online Library
The recent decade has witnessed an exponential surge of digital content, especially
multimedia and its applications. The security requirements of these innovative platforms …

Creation of S-box based on a hierarchy of Julia sets: image encryption approach

RH Sani, S Behnia, A Akhshani - Multidimensional Systems and Signal …, 2022 - Springer
The newly introduced family of complex chaotic maps has different behavior concerning the
well-known complex chaotic maps. These complex maps have excellent properties such as …

CESARAE: computationally efficient and statistical attack resistant audio encryption system

M Nabi, MO Ul Islam, SA Parah - Multimedia Tools and Applications, 2024 - Springer
Audio piracy in the real-time transmission has intensified with digital replication and
distribution, making unauthorized sharing effortless and widespread, leading to a significant …

CyberSecGuard: Enhanced Visual Data Security with BLAKE2 Encryption and NIDS Defense

AJ Bhuvaneshwari, P Kaythry - 2024 10th International …, 2024 - ieeexplore.ieee.org
With the combination of the Visual Cryptosystem, the BLAKE2 hash algorithm, and a
Network Intrusion Detection System (NIDS), this article presents a holistic approach to …