An integrated image encryption scheme based on elliptic curve

I Khalid, T Shah, SM Eldin, D Shah, M Asif… - IEEE …, 2022 - ieeexplore.ieee.org
Due to the extensive demand for digital images across all fields, the security of multimedia
data over insecure networks is a challenging task. The majority of the existing modern …

Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations

A Razaq, G Alhamzi, S Abbas, M Ahmad, A Razzaque - Heliyon, 2023 - cell.com
Protection of sensitive information has been always the major security concern since
decades to withstand against illegitimate access and usage. Substitution-boxes (S-boxes) …

[HTML][HTML] An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal's matrix

AA Neamah - Journal of King Saud University-Computer and …, 2023 - Elsevier
The transmission of an excessive number of images between users via the Internet and
other communication media necessitates the use of effective techniques to protect the …

Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher

PN Lone, D Singh, V Stoffová, DC Mishra, UH Mir… - Mathematics, 2022 - mdpi.com
In the present era of digital communication, secure data transfer is a challenging task in the
case of open networks. Low-key-strength encryption techniques incur enormous security …

A novel image encryption scheme based on elliptic curves and coupled map lattices

NA Azam, G Murtaza, U Hayat - Optik, 2023 - Elsevier
The security of digital images has become the main concern due to the rapid rise in the
sharing of data over the Internet and open networks. Recently many image cryptosystems …

A novel conservative chaotic system involved in hyperbolic functions and its application to design an efficient colour image encryption scheme

AA Neamah, AA Shukur - Symmetry, 2023 - mdpi.com
It is well known that, compared to low-dimension chaotic systems, three-dimensional chaotic
systems have a wider parameter range, more complicated behaviour, and better …

Substitution box generator with enhanced cryptographic properties and minimal computation time

T Haider, NA Azam, U Hayat - Expert Systems with Applications, 2024 - Elsevier
With the widespread use of digital devices and the internet, implementing advanced security
systems is essential to protect confidential information from cyberattacks and unauthorized …

[HTML][HTML] An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security

O Popoola, MA Rodrigues, J Marchang, A Shenfield… - Internet of Things, 2024 - Elsevier
This study proposes an optimized hybrid encryption framework combining ECC-256r1 with
AES-128 in EAX mode, tailored for smart home healthcare environments, and conducts a …

Generation of boxes and permutations using a bijective function and the Lorenz equations: An application to color image encryption

VM Silva-García, R Flores-Carapia… - Mathematics, 2023 - mdpi.com
Some images that contain sensitive information and travel through the network require
security. Therefore, a symmetric cryptosystem that encrypts images and resists known …

[HTML][HTML] Parametrization of generalized triangle groups and construction of substitution-box for medical image encryption

AZ Abbasi, A Rafiq, L Kolsi - Journal of King Saud University-Computer and …, 2024 - Elsevier
The construction of strong encryption techniques is crucial to meet the increasing demand
for secure transmission as well as storage of medical images. A substitution box (S-Box) is …