A survey of image encryption algorithms

QH Makki, AM Abdalla… - … Conference on Information …, 2021 - ieeexplore.ieee.org
Data and image security is one of the most important aspects of information storage as well
as the massive and still expanding internet. The frequent use of images of various types …

A review of nonlinear image-denoising techniques

AM Abdalla, MS Osman… - 2018 Second World …, 2018 - ieeexplore.ieee.org
This paper discusses different nonlinear techniques for removing noise from images; ie,
image denoising. These techniques differ in terms of algorithm design, purpose …

[HTML][HTML] A simple flexible cryptosystem for meshed 3D objects and images

MAAJA Mizher, R Sulaiman, AMA Abdalla… - Journal of King Saud …, 2021 - Elsevier
In cryptography, the previous research generally appears ambiguous and complex to the
novice researcher due to the use of complex mathematical equations and rules of …

[PDF][PDF] A variable circular-shift image-encryption algorithm

AA Tamimi, AM Abdalla - Proceedings of the International …, 2017 - researchgate.net
A new algorithm is presented for lossless image encryption using a private key. The image is
regarded as a stream of bytes, and grouped into variable-length blocks whose sizes depend …

[PDF][PDF] An image encryption algorithm with XOR and S-box

AA Tamimi, AM Abdalla - Proceedings of the International …, 2015 - researchgate.net
This new algorithm performs lossless image encryption by combining variable-length key-
dependent XOR encryption with S-box substitution. This algorithm was implemented and …

Utilizing Quality Measures in Evaluating Image Encryption Methods

AA Tamimi, AM Abdalla, MM Abdallah - … from IPCV'20, HIMS'20, BIOCOMP' …, 2021 - Springer
The metrics or measures used in evaluating image quality usually serve applications that
aim at enhancing image appearance or at preventing the image quality from degrading after …

An improved simple flexible cryptosystem for 3D objects with texture maps and 2D images

MA Mizher, R Sulaiman, AM Abdalla… - Journal of Information …, 2019 - Elsevier
With the continued evolution of three dimensional (3D) object presentation and usage, the
security of such objects has become an increasingly desirable research area. Previous …

Multiple-image fusion encryption (MIFE) using discrete cosine transformation (DCT) and pseudo random number generators

LMH Yepdia, A Tiedeu, Z Lachiri - Multimed Inf Retrieval, 2020 - books.google.com
This chapter proposes a new multiple-image encryption algorithm based on spectral fusion
of watermarked images and new chaotic generators. Logistic-May (LM), May-Gaussian …

Development of Android-based FURUNO radar simulation training system

P Wang, H Ren, Y Zhang, G Liu - International Symposium on …, 2022 - spiedigitallibrary.org
In order to adapt to the new changes in the network era, to solve the problems of the high
cost of navigation radar equipment, the high cost of navigation teaching and training and …

[PDF][PDF] Multiple Image Fusion Encryption (MIFE) using Discrete Cosine Transformation (DCT) and Chaotic Generators

LMH Yepdia, A Tiedeu, Z Lachiri - personales.upv.es
This paper proposes a new multiple-image encryption algorithm based on spectral fusion of
images and new chaotic generators. Logistic-May (LM), May-Gaussian (MG) and Gaussian …