Computational image encryption techniques: a comprehensive review

M Kaur, S Singh, M Kaur - Mathematical Problems in …, 2021 - Wiley Online Library
Images contain very sensitive and confidential information. Because images play a
significant role in many applications such as military communication, remote‐sensing, and …

PSO-based image encryption scheme using modular integrated logistic exponential map

O Kocak, U Erkan, A Toktas, S Gao - Expert Systems with Applications, 2024 - Elsevier
Image encryption (IE) has been essential for internet-based storing and transferring in recent
years. Effective chaotic systems play a crucial role in IE schemes which widely depend on …

Secure and energy efficient-based E-health care framework for green internet of things

M Kaur, D Singh, V Kumar, BB Gupta… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
This paper proposes a secure and energy-efficient Internet of Things (IoT) model for e-
health. The main objective is to secure the transmission and retrieval of biomedical images …

Hybrid optimization with cryptography encryption for medical image security in Internet of Things

M Elhoseny, K Shankar, SK Lakshmanaprabu… - Neural computing and …, 2020 - Springer
The development of the Internet of Things (IoT) is predicted to change the healthcare
industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is …

CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

M Tahir, M Sardaraz, Z Mehmood, S Muhammad - Cluster Computing, 2021 - Springer
Cloud Computing is referred to as a set of hardware and software that are being combined
to deliver various services of computing. The cloud keeps the services for delivery of …

A novel image encryption scheme based on an elliptic curve

U Hayat, NA Azam - Signal Processing, 2019 - Elsevier
Elliptic curve cryptography (ECC) is capable of providing high security than to other
cryptosystems with same key size. The aim of this paper is twofold. Firstly, we present new …

Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption

M Kaur, D Singh - Multidimensional Systems and Signal Processing, 2021 - Springer
Chaotic-based image encryption approaches have attracted great attention in the field of
information security. The properties of chaotic maps such as randomness and sensitivity …

An image encryption scheme based on elliptic curve pseudo random and advanced encryption system

S Toughi, MH Fathi, YA Sekhavat - Signal processing, 2017 - Elsevier
Abstract Elliptic Curve Cryptography (ECC) has proven to be an effective cryptography. ECC
has its own advantages such as efficient key size compared to other Public Key …

Image encryption method based on improved ECC and modified AES algorithm

A Hafsa, A Sghaier, J Malek, M Machhout - Multimedia Tools and …, 2021 - Springer
Currently, embedded systems can be found everywhere in quotidian life. In the development
of embedded systems, information security is one of the important factors. Encryption is an …

Medical image security using dual encryption with oppositional based optimization algorithm

T Avudaiappan, R Balasubramanian… - Journal of medical …, 2018 - Springer
Security is the most critical issue amid transmission of medical images because it contains
sensitive information of patients. Medical image security is an essential method for secure …