An image encryption method based on elliptic curve elgamal encryption and chaotic systems

Y Luo, X Ouyang, J Liu, L Cao - IEEE Access, 2019 - ieeexplore.ieee.org
Due to the potential security problem about key management and distribution for the
symmetric image encryption schemes, a novel asymmetric image encryption method is …

A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network

X Duan, D Guo, N Liu, B Li, M Gou, C Qin - IEEE Access, 2020 - ieeexplore.ieee.org
Image steganography is a technology that hides sensitive information into an image. The
traditional image steganography method tends to securely embed secret information in the …

A tree structure-based improved blockchain framework for a secure online bidding system

A Sarfaraz, RK Chakrabortty, DL Essam - Computers & Security, 2021 - Elsevier
The BlockChain (BC) is considered as one of the most exciting developments in information
and communication technology in the past decade and is widely known as a crypto intensive …

High-speed ECC processor over NIST prime fields applied with Toom–Cook multiplication

J Ding, S Li, Z Gu - IEEE Transactions on Circuits and Systems I …, 2018 - ieeexplore.ieee.org
In this paper, a high-speed elliptic curve cryptography (ECC) processor specialized for
primes recommended by the National Institute of Standards and Technology (NIST) was …

Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm

M Hussain, N Iqbal, Z Bashir - Cluster Computing, 2024 - Springer
Traditionally, keys are generated using the hash value of the given image in the image
cryptography to boost the security effects. The keys have been sent to the concerned …

Analysis of elliptic curve cryptography & RSA

MR Khan, K Upreti, MI Alam, H Khan… - Journal of ICT …, 2023 - ieeexplore.ieee.org
In today's digital world, the Internet is an essential component of communication networks. It
provides a platform for quickly exchanging information among communicating parties. There …

A compressive sensing based image encryption and compression algorithm with identity authentication and blind signcryption

X Li, D Xiao, H Mou, D Lu, M Peng - IEEE Access, 2020 - ieeexplore.ieee.org
Recently, a robust and secure image sharing scheme with personal identity information
embedded was proposed based on Compressive Sensing, Secret Image Sharing and Diffie …

[PDF][PDF] Text encryption using pell sequence and elliptic curves with provable security

S Azhar, NA Azam, U Hayat - Comput. Contin, 2022 - researchgate.net
The demand for data security schemes has increased with the significant advancement in
the field of computation and communication networks. We propose a novel three-step text …

A color image authenticated encryption using conic curve and Mersenne twister

RI Abdelfatah - Multimedia Tools and Applications, 2020 - Springer
A robust secure image transmission scheme has to achieve all the security services as
confidentiality, authentication, integrity and nonrepudiation with a reasonable efficiency. An …

[PDF][PDF] An efficient hybrid elliptic curve cryptography system with DNA encoding

P Barman, B Saha - International Research Journal of Computer …, 2015 - academia.edu
Cryptography is the technique to encrypt and decrypt the data for secure communication.
The cryptographic mechanism enables the entities of network to transmit secure data …