An overview of encryption algorithms in color images

HM Ghadirli, A Nodehi, R Enayatifar - Signal Processing, 2019 - Elsevier
Nowadays, security in data transfer is of special importance. Images are of the most
attractive kinds of data in the encryption domain. Color images are more attractive than the …

Biometric applications in education

M Hernandez-de-Menendez… - International Journal on …, 2021 - Springer
Educational institutions are acquiring novel technologies to help make their processes more
efficient and services more attractive for both students and faculty. Biometric technology is …

A new 1D chaotic system for image encryption

Y Zhou, L Bao, CLP Chen - Signal processing, 2014 - Elsevier
This paper introduces a simple and effective chaotic system using a combination of two
existing one-dimension (1D) chaotic maps (seed maps). Simulations and performance …

A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice

YQ Zhang, XY Wang - Information Sciences, 2014 - Elsevier
We propose a new image encryption algorithm based on the spatiotemporal chaos of the
mixed linear–nonlinear coupled map lattices. This spatiotemporal chaotic system has more …

Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

C Li, D Lin, J Lü, F Hao - IEEE multimedia, 2018 - ieeexplore.ieee.org
This paper performs a thorough security analysis of a chaotic image encryption algorithm
based on autoblocking and electrocardiography from the view point of modern cryptography …

Local Shannon entropy measure with statistical tests for image randomness

Y Wu, Y Zhou, G Saveriades, S Agaian, JP Noonan… - Information …, 2013 - Elsevier
In this paper we propose a new image randomness measure using Shannon entropy over
local image blocks. The proposed local Shannon entropy measure overcomes several …

Image encryption: Generating visually meaningful encrypted images

L Bao, Y Zhou - Information Sciences, 2015 - Elsevier
To protect image contents, most existing encryption algorithms are designed to transform an
original image into a texture-like or noise-like image which is, however, an obvious visual …

An efficient symmetric image encryption algorithm based on an intertwining logistic map

G Ye, X Huang - Neurocomputing, 2017 - Elsevier
Differing from the traditional permutation–diffusion architecture, an efficient symmetric image
encryption algorithm is designed in this paper. To resolve the issue of low sensitivity of a …

An effective framework for chaotic image encryption based on 3D logistic map

G Ye, K Jiao, C Pan, X Huang - Security and Communication …, 2018 - Wiley Online Library
In this paper, an effective framework for chaotic encryption based on a three‐dimensional
logistic map is presented together with secure hash algorithm‐3 (SHA‐3) and …

A double chaotic layer encryption algorithm for clinical signals in telemedicine

MA Murillo-Escobar, L Cardoza-Avendaño… - Journal of medical …, 2017 - Springer
Recently, telemedicine offers medical services remotely via telecommunications systems
and physiological monitoring devices. This scheme provides healthcare delivery services …