In this study, a new method has been eliciting for encoding 2D and 3D color images. The DNA strand construction was used as the basis for structuring the method. This method …
J Wang, L Liu, M Xu, X Li - Journal of King Saud University-Computer and …, 2022 - Elsevier
Many holistic image encryption schemes have been proposed in recent decades that achieve a certain security level. However, considering the actual application environment …
The traditional watershed algorithm has the disadvantage of over-segmentation and interference with an image by reflected light. We propose an improved watershed color …
A Girdhar, H Kapur, V Kumar - Applied Physics B, 2021 - Springer
Image encryption converts a meaningful image into some random arrangement of pixel intensities. That means, the intelligible property of an image is destroyed. Taking into …
Reports from the US Federal Bureau of investigation have indicated a lot of unethical activities taking place on the internet environments. Despite some technical challenges …
S De, J Bhaumik, D Giri - Multimedia Tools and Applications, 2022 - Springer
In the current decade, chaos based image encryption has distinctly captured a remarkable position in multimedia data security. In this paper, a hybrid chaos based image encryption …
S Ibrahim, MG Egila, H Shawkey… - … Conference on I …, 2020 - ieeexplore.ieee.org
The use of biometrics in security applications may be vulnerable to several challenges of hacking. Thus, the emergence of cancellable biometrics becomes a suitable solution to this …
A Paul, S Kandar - Multimedia Tools and Applications, 2022 - Springer
A multiple image encryption using pseudo random (PR) sequence is proposed in this article. A non-chaotic technique pillared on modified Newton-Raphson method is applied to …
Z Man - Chaos, Solitons & Fractals, 2023 - Elsevier
Biometric technology is increasingly being used in various areas, including government law enforcement, exit and entry management, visitor access control, user identification, and daily …