Review of the metaheuristic algorithms in applications: Visual analysis based on bibliometrics (1994–2023)

G Li, T Zhang, CY Tsai, L Yao, Y Lu, J Tang - Expert Systems with …, 2024 - Elsevier
Metaheuristic algorithms have gradually become the mainstream way to solve complex
optimization problems with their streamlined structure and robust performance. Innovative …

A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

Fast and Lightweight Image Cryptosystem for IoMT Applications

MOU Islam, SA Parah - Internet of Things, 2024 - Elsevier
This paper presents a fast and lightweight image encryption technique founded on a new
concept of progressive and selective diffusion. We make use of modified chaotic systems …

Systematic survey on visually meaningful image encryption techniques

V Himthani, VS Dhaka, M Kaur, D Singh… - IEEE Access, 2022 - ieeexplore.ieee.org
Due to advancements in technology, digital images are widely used in various applications
like medical field, military communication, remote sensing, etc. These images may contain …

Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security

AS Almasoud, B Alabduallah, H Alqahtani, SS Aljameel… - Heliyon, 2024 - cell.com
Image encryption involves applying cryptographic approaches to convert the content of an
image into an illegible or encrypted format, reassuring that illegal users cannot simply …

Reconfigurable logic and in-sensor encryption operations in an asymmetrically tunable van der Waals heterostructure

F Gong, W Deng, Y Wu, F Liu, Y Guo, Z Che, J Li, J Li… - Nano Research, 2024 - Springer
Reconfigurable devices can be used to achieve multiple logic operation and intelligent
optical sensing with low power consumption, which is promising candidates for new …

Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis

A El‐Dalahmeh, M El‐Dalahmeh… - Security and …, 2024 - Wiley Online Library
Vehicular ad‐hoc networks (VANETs) support features like comfort, safety, and infotainment,
enhancing traffic efficiency. However, traditional VANETs struggle with dynamic and large …

Efficient colour image encryption algorithm using a new fractional-order memcapacitive hyperchaotic system

ZASA Rahman, BH Jasim, YIA Al-Yasir… - Electronics, 2022 - mdpi.com
In comparison with integer-order chaotic systems, fractional-order chaotic systems exhibit
more complex dynamics. In recent years, research into fractional chaotic systems for the …

Image encryption algorithm based on a novel cascade chaotic system and DNA mutation

P Li, X Zhang - Physica Scripta, 2024 - iopscience.iop.org
The image is an important medium for information transfer. To ensure image security and
improve encryption efficiency, a novel image encryption algorithm is proposed in this paper …

[PDF][PDF] Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography.

M Sandhu, M Ahmed, M Hussain, I Khan - International Arab Journal of …, 2024 - iajit.org
In the digital age, strong methods for safeguarding sensitive data are essential. Image
steganography is a practical technique for data protection that hides information inside …