Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation

J Yu, W Xie, Z Zhong, H Wang - Chaos, Solitons & Fractals, 2022 - Elsevier
As the application of multimedia technology intensifies recently, more and more attention
has been paid to privacy protection in image data. The interest in DNA-based image …

Multi-layer security based multiple image encryption technique

S Sabir, V Guleria - Computers and Electrical Engineering, 2023 - Elsevier
This paper designs a novel multiple image encryption technique utilizing affine Hill cipher
(AHC), reality-preserving two-dimensional discrete fractional Hartley transform (RP2DFrHT) …

FPGA realization of four chaotic interference cases in a terrestrial trajectory model and application in image transmission

MA Estudillo-Valdez, VA Adeyemi, E Tlelo-Cuautle… - Scientific Reports, 2023 - nature.com
This article presents a technique to integrate two dynamical models, a four-wing spherical
chaotic oscillator and the elliptical path described by the planet Earth during its translation …

Image encryption algorithm based on DNA network and hyperchaotic system

J Yu, K Peng, L Zhang, W Xie - The Visual Computer, 2024 - Springer
This paper presents a novel deoxyribonucleic acid (DNA) network encryption method
combined with a hyperchaotic system for image encryption. The DNA network encryption …

Reversible data hiding scheme based on improved interpolation and three-in-one intelligent strategy

H Zhang, H Sun, F Meng - Journal of Information Security and Applications, 2023 - Elsevier
Reversible data hiding method combined with interpolation is a widely used technique in
secretly transmitting large collections of information through images. However, this approach …

Multiobjective Optimization of Chaotic Image Encryption Based on ABC Algorithm and DNA Coding

J Yu, W Xie, L Zhang - International Journal of Bifurcation and …, 2024 - World Scientific
As digital communication and storage continue to expand, the protection of image privacy
information becomes increasingly critical. To safeguard sensitive visual information from …