[HTML][HTML] Nanotechnology and computer science: Trends and advances

TB Taha, AA Barzinjy, FHS Hussain… - … , Devices, Circuits and …, 2022 - Elsevier
Nanotechnology is the aptitude to perceive, measure, operate, and build materials at the
nanometer scale, the size of atoms and molecules. Nanotechnology, is involved in many …

An image security model based on chaos and DNA cryptography for IIoT images

AK Singh, K Chatterjee, A Singh - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The images generated by smart cameras and sensors in an Industrial Internet of Things
(IIoT) ecosystem are at significant risk when transmitted over a public network due to the …

A chaotic image encryption scheme based on multi-directional confusion and diffusion operations

M Hussain, N Iqbal, Z Bashir - Journal of information security and …, 2022 - Elsevier
A careful perusal of the literature regarding the image encryption algorithms indicates that
many research articles based on pixel swapping operations in the horizontal and vertical …

An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map

N Iqbal, I Hussain, MA Khan, S Abbas… - Multimedia Tools and …, 2023 - Springer
Researchers have paid increasing attention towards the usage of scrambled image for the
image encryption in recent years. 2D and 3D scrambled images have already been …

Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm

M Hussain, N Iqbal, Z Bashir - Cluster Computing, 2024 - Springer
Traditionally, keys are generated using the hash value of the given image in the image
cryptography to boost the security effects. The keys have been sent to the concerned …

A color image encryption scheme using customized map

P Mathivanan, P Maran - The Imaging Science Journal, 2023 - Taylor & Francis
The paper presents a new method for encrypting color images using a customized globally
coupled lattice (CGCL) map. The process involves generating an initial parameter for the …

An Efficient Audio Encryption Scheme Based on Elliptic Curve over Finite Fields

H Ur Rehman, MM Hazzazi, T Shah, Z Bassfar, D Shah - Mathematics, 2023 - mdpi.com
Elliptic curve (EC) based cryptographic systems are more trustworthy than the currently used
cryptographic approaches since they require less computational work while providing good …

A novel chaos map based medical image encryption scheme

A Kumar, M Dua - The Imaging Science Journal, 2021 - Taylor & Francis
In the medical industry, digital images are frequently used to diagnose a variety of diseases.
These images comprise of lot of secret information regarding health of the patient. Image …

Innovative chaotic dragon fractal (ChDrFr) shapes for efficient encryption applications: a new highly secure image encryption algorithm

AG Mohammed, SE El-Khamy - Multimedia Tools and Applications, 2024 - Springer
In this paper, the generation of new dragon fractal shapes with chaotic iteration parameters
is introduced as the main component of a new efficient approach for different cryptographic …

Generation of boxes and permutations using a bijective function and the Lorenz equations: An application to color image encryption

VM Silva-García, R Flores-Carapia… - Mathematics, 2023 - mdpi.com
Some images that contain sensitive information and travel through the network require
security. Therefore, a symmetric cryptosystem that encrypts images and resists known …