Image encryption techniques: A comprehensive review

H Kolivand, SF Hamood… - Multimedia Tools …, 2024 - researchonline.ljmu.ac.uk
This paper presents an exhaustive review of research within the field of image encryption
techniques. It commences with a general introduction to image encryption, providing an …

Image encryption framework based on multi-chaotic maps and equal pixel values quantization

H Kolivand, SF Hamood, S Asadianfam… - Multimedia Tools and …, 2024 - Springer
The importance of image encryption has considerably increased, especially after the
dramatic evolution of the internet and network communications, due to the simplicity of …

Design and efficient implementation of a chaos-based stream cipher

MA Taha, SE Assad, A Queudet… - … Journal of Internet …, 2017 - inderscienceonline.com
We designed and implemented a stream cipher cryptosystem based on an efficient chaotic
generator of finite computing precision (N= 32). The proposed structure of the chaotic …

Lightweight stream ciphers based on chaos for time and energy constrained IoT applications

O Jallouli, M Chetto, S El Assad - 2022 11th Mediterranean …, 2022 - ieeexplore.ieee.org
The design of efficient and secure cryptographic algorithms is a fundamental problem of
cryptography. Due to the tight cost and constrained resources devices such as Radio …

Real-time and portable chaos-based crypto-compression systems for efficient embedded architectures

MA Taha - 2017 - hal.science
Image and video protection have gained a lot of momentum over the last decades. In this
work, first we designed and realized in an efficient and secure way a pseudo-chaotic …

Analysis of the logistic and skew tent map for smart coupling over a finite field

Z Qiao, I Taralova, M Saad, S El Assad - 13th Chaotic Modeling and …, 2021 - Springer
Chaotic maps have been proved to be efficient in the design of pseudo-random number
generator (PRNG). However, the great majority of chaotic maps uses real numbers. Due to …

[PDF][PDF] International Journal of Research in Engineering and Management

MDEA Shirazi - crdeepjournal.org
Image encryption, fundamentally defined as the process of transforming a plain image into a
coded form that can only be deciphered by its intended recipient [1] has gained increasing …