KAK Patro, A Soni, PK Netam, B Acharya - Journal of Information Security …, 2020 - Elsevier
This paper proposes a newly developed multiple grayscale image encryption scheme using cross-coupling of two Piece-wise Linear Chaotic Maps (PWLCM). In this scheme, cross …
A Banu S, R Amirtharajan - Medical & biological engineering & computing, 2020 - Springer
Today's technological era, the booming desire for e-healthcare has inflated the attention towards the security of data from cyber attacks. As the digital medical images are transferred …
Y Ma, C Li, B Ou - Journal of Information Security and Applications, 2020 - Elsevier
Recently, an image block encryption algorithm was proposed based on some well-known chaotic maps. The authors claim that the encryption algorithm achieves enough security …
N Iqbal, M Hanif, S Abbas, MA Khan… - Journal of Information …, 2021 - Elsevier
Hundreds of image encryption schemes based on the conventional 2D image space exist in the literature. Very few were built using the 3D image space. In this study, for better security …
R Zhao, Y Zhang, Y Nan, W Wen, X Chai, R Lan - Information Sciences, 2022 - Elsevier
Traditional image encryption schemes turn images with rich visual contents into meaningless noise-like ones. This assures privacy security at the expense of visual …
JS Khan, W Boulila, J Ahmad, S Rubaiee… - IEEE …, 2020 - ieeexplore.ieee.org
Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new …
R Wang, GQ Deng, XF Duan - Journal of Information Security and …, 2021 - Elsevier
In recent years, image encryption has become a very popular and effective method to protect digital images. Among many image encryption methods, the image encryption algorithm …
S Zhu, C Zhu - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, a five-dimensional discrete hyperchaotic map is constructed by combining Logistic map and 3D discrete Lorenz map. Based on this chaotic system, a block-based …
E Winarno, K Nugroho, PW Adi - IEEE Access, 2023 - ieeexplore.ieee.org
The quality of encryption is dependent on the complexity of the confusion-diffusion pattern and the quality of the keystream employed. To enhance complexity and randomness, this …