[PDF][PDF] NPCR and UACI randomness tests for image encryption

Y Wu, JP Noonan, S Agaian - … in science and technology, Journal of …, 2011 - Citeseer
The number of changing pixel rate (NPCR) and the unified averaged changed intensity
(UACI) are two most common quantities used to evaluate the strength of image encryption …

[PDF][PDF] Efficiency analysis and security evaluation of image encryption schemes

J Ahmad, F Ahmed - computing, 2010 - Citeseer
In recent years, there has been significant development in multimedia technologies.
Transmission of multimedia data such as audio, video and images over the Internet is now …

A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

Image encryption method based on improved ECC and modified AES algorithm

A Hafsa, A Sghaier, J Malek, M Machhout - Multimedia Tools and …, 2021 - Springer
Currently, embedded systems can be found everywhere in quotidian life. In the development
of embedded systems, information security is one of the important factors. Encryption is an …

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map

F Masood, W Boulila, A Alsaeedi, JS Khan… - Multimedia Tools and …, 2022 - Springer
In the existing literature, numerous chaos-based multimedia encryption schemes have been
presented. Benefiting from inherent properties such as ergodicity and key-sensitivity; this …

An efficient image encryption scheme based on: Henon map, skew tent map and S-Box

J Khan, J Ahmad, SO Hwang - 2015 6th International …, 2015 - ieeexplore.ieee.org
Due to easy and simple implementation, normally single 1-D chaotic maps like logistic and
sine maps are employed in multimedia data encryption. However, data encrypted through a …

[PDF][PDF] Image encryption using different techniques: A review

KD Patel, S Belani - International Journal of Emerging Technology …, 2011 - researchgate.net
In present times, the protection of multimedia data is becoming very important. The
protection of this multimedia data can be done with encryption. There are so many different …

When an attacker meets a cipher-image in 2018: A year in review

C Li, Y Zhang, EY Xie - Journal of Information Security and Applications, 2019 - Elsevier
This paper aims to review the encountered technical contradictions when an attacker meets
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …

On the security of an image encryption method

S Li, X Zheng - Proceedings. International Conference on …, 2002 - ieeexplore.ieee.org
The security of digital images has attracted much attention, and many different image
encryption methods have been proposed. Yen and Guo (see Proc. IEEE Workshop Signal …

Parallel strength Pareto evolutionary algorithm‐II based image encryption

M Kaur, D Singh, R Singh Uppal - IET Image Processing, 2020 - Wiley Online Library
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …