Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

U Zia, M McCartney, B Scotney, J Martinez… - International Journal of …, 2022 - Springer
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …

Traditional and hybrid encryption techniques: a survey

P Dixit, AK Gupta, MC Trivedi, VK Yadav - Networking Communication and …, 2018 - Springer
Abstract Information security is the process that protects its availability, privacy, and integrity.
Access to stored information on computer databases has increased nowadays. Most …

RSA and Elliptic Curve Encryption System: A Systematic Literature Review

M Ugbedeojo, MO Adebiyi, OJ Aroba… - International Journal of …, 2024 - igi-global.com
Almost every living species has a motive to communicate electronically with one another
and preserve data for immediate or future use. These data are becoming too large to be …

Reducing the required time and power for data encryption and decryption using K-NN machine learning

MU Bokhari, QM Shallal… - IETE Journal of Research, 2019 - Taylor & Francis
Cloud computing allows the users to store their data in its storage and use them whenever
they need. While the data of user is traveling outside its physical infrastructure through …

Implementation of AES cryptography and twofish hybrid algorithms for cloud

KI Santoso, MA Muin, MA Mahmudi - Journal of Physics …, 2020 - iopscience.iop.org
Data exchange is an inevitable issue in this digital age. Especially data in a cloud system.
The data must be secured so as not to be abused by people who are not entitled to …

Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks

J Anitha Ruth, H Sirmathi… - IET Information Security, 2019 - Wiley Online Library
Nowadays, it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organisations. But secured data …

[PDF][PDF] Evaluation of hybrid encryption technique to secure data during transmission in cloud computing

MU Bokhari, QM Shallal - International Journal of Computer …, 2017 - researchgate.net
The technology of Cloud computing is permit the subscribers to store their own data in its
infrastructure. The subscribers will be able to use their stored data whenever they required …

Assessment of encryption and decryption schemes for secure data transmission in healthcare systems

KB Adedeji, NI Nwulu, C Aigbavboa… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
In the biomedical research community, transmitting a patient medical record via wireless
means to an administrative centre or other medical centres is increasingly common …

Improved image encryption for real-time application over wireless communication networks using hybrid cryptography technique

KB Adedeji, AA Ponnle - Indonesian Journal of Electrical …, 2016 - section.iaesonline.com
Advances in communication networks have enabled organization to send confidential data
such as digital images over wireless networks. However, the broadcast nature of wireless …

Stochastic Quantum Bolt-Belief Neural Network-Based Insrusion Detection With Two-Fish Digital Hash Cryptography for Data Security

P Kirubanantham, GM Karthik… - Machine Learning and …, 2024 - igi-global.com
Ensuring the security of wireless data transmission is a crucial element of intrusion detection
systems (IDS) that rely on deep learning and cryptography. Therefore, this study introduces …