Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics

Y Lin, Z Xie, T Chen, X Cheng, H Wen - Expert Systems with Applications, 2024 - Elsevier
The protection of digital image privacy in Big Data environment is a hot issue of increasing
concern. To address the contradiction between efficiency and security for privacy protection …

Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding

H Wen, Y Lin - Expert Systems with Applications, 2024 - Elsevier
Recently, an image encryption algorithm using Quantum Chaotic Map and DNA Coding
(QCMDC-IEA) has been reported. It consists of two main components: pixel-level …

Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion

H Wen, Y Lin, S Kang, X Zhang, K Zou - IScience, 2024 - cell.com
Aiming at the problem of insufficient security of image encryption technology, a secure
image encryption algorithm using chaos-based block permutation and weighted bit planes …

Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption

W Feng, Q Wang, H Liu, Y Ren, J Zhang, S Zhang… - Fractal and …, 2023 - mdpi.com
Chaos-based image encryption has become a prominent area of research in recent years. In
comparison to ordinary chaotic systems, fractional-order chaotic systems tend to have a …

[HTML][HTML] A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps

W Feng, J Yang, X Zhao, Z Qin, J Zhang, Z Zhu, H Wen… - Mathematics, 2024 - mdpi.com
Chaos-based encryption is promising for safeguarding digital images. Nonetheless, existing
chaos-based encryption algorithms still exhibit certain shortcomings. Given this, we propose …

OSMRD-IE: octal-based shuffling and multi-layer rotational diffusing image encryption using 2D hybrid Michalewicz-Ackley map

U Erkan, A Toktas, S Memis, F Toktas… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The security of a chaos-based image encryption (IE) systems is based upon chaotic map's
performance and the encryption algorithm's permutation and diffusion strategies …

Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos

H Wen, Y Lin, L Yang, R Chen - Expert Systems with Applications, 2024 - Elsevier
In 2019, a chaotic image encryption scheme based on a variant of the Hill cipher (VHC-
CIES) was proposed by the Moroccan scholars. VHC-CIES introduces a Hill cipher variant …

Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm

T Aljrees, A Kumar, KU Singh, T Singh - Sensors, 2023 - mdpi.com
This research paper introduces a novel paradigm that synergizes innovative algorithms,
namely efficient data encryption, the Quondam Signature Algorithm (QSA), and federated …

A robust memristor-enhanced polynomial hyper-chaotic map and its multi-channel image encryption application

K Qian, Y Xiao, Y Wei, D Liu, Q Wang, W Feng - Micromachines, 2023 - mdpi.com
Nowadays, the utilization of memristors to enhance the dynamical properties of chaotic
systems has become a popular research topic. In this paper, we present the design of a …

An innovative feasible approach for multi-media security using both chaotic and elliptic curve structures

T Qayyum, T Shah, AY Hummdi, A Aljaedi… - IEEE Access, 2024 - ieeexplore.ieee.org
Researchers concentrate on data security using cryptography, using different approaches to
protect confidential data, such as digital images holding private information. They use …