A new image encryption algorithm with feedback key mechanism using two-dimensional dual discrete quadratic chaotic map

F Yin, A Li, C Lv, R Wu, S Gao - Nonlinear Dynamics, 2024 - Springer
With the continuous advancement of information technology, the security of digital images is
becoming increasingly important. To ensure the secure transmission of images, this paper …

Enhancing image data security using the APFB model

K Barik, S Misra, LF Sanz, S Chockalingam - Connection Science, 2024 - Taylor & Francis
Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography
recreates a critical function in safeguarding information from potential risks and confirming …

A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology

A Gupta, S Namasudra, P Kumar - The Journal of Supercomputing, 2024 - Springer
Data centres have become the backbone of infrastructure for delivering cloud services. In
the emerging cloud computing paradigm, virtual machine (VM) live migration involves …

State of health estimation joint improved grey wolf optimization algorithm and LSTM using partial discharging health features for lithium-ion batteries

S Peng, Y Wang, A Tang, Y Jiang, J Kan, M Pecht - Energy, 2024 - Elsevier
Accurate estimation of the state of health (SOH) of lithium-ion batteries is crucial for the
safety and operation of electric vehicles. The accuracy and efficiency of SOH estimation are …

Obfuscation-resilient detection of Android third-party libraries using multi-scale code dependency fusion

Z Zhang, S Luo, Y Lu, L Pan - Information Fusion, 2024 - Elsevier
Abstract Third-Party Library (TPL) detection is a crucial aspect of Android application
security assessment, but it faces significant challenges due to code obfuscation. Existing …

A self-reversible image encryption algorithm utilizing a novel chaotic map

L Li - Nonlinear Dynamics, 2025 - Springer
This paper introduces an innovative self-reversible image encryption algorithm designed to
optimize resource utilization and enhance the efficiency of managing encryption and …

A multi-image encryption scheme based on a new n-dimensional chaotic model and eight-base DNA

M Zhao, L Li, Z Yuan - Chaos, Solitons & Fractals, 2024 - Elsevier
At present, multi-image encryption schemes usually require the type, quantity and size of
images to be fixed, and there are many restrictions. Therefore, this paper proposes a multi …

A Novel Quantum Hash-Based Attribute-Based Encryption Approach for Secure Data Integrity and Access Control in Mobile Edge Computing-Enabled Customer …

KK Singamaneni, G Muhammad, Z Ali - IEEE Access, 2024 - ieeexplore.ieee.org
The domain of Mobile Edge Computing (MEC) has seen rapid growth, making consumer
behavior research an essential element in many applications. Nevertheless, in MEC …

Content-Aware Tunable Selective Encryption for HEVC using Sine-Modular Chaotification Model

Q Sheng, C Fu, Z Lin, J Chen, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Existing High Efficiency Video Coding (HEVC) selective encryption algorithms only consider
the encoding characteristics of syntax elements to keep format compliance, but ignore the …

[HTML][HTML] An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical …

MM Hazzazi, SA Baowidan, A Yousaf, M Adeel - Symmetry, 2024 - mdpi.com
Data security and privacy have become essential due to the increasingly advanced
interconnectivity in today's world, hence the reliance on cryptography. This paper introduces …