Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …
importance of strong and robust cybersecurity measures has become increasingly …
Intelligent and vision-based fire detection systems: A survey
F Bu, MS Gharajeh - Image and vision computing, 2019 - Elsevier
Fire is one of the main disasters in the world. A fire detection system should detect fires in
various environments (eg, buildings, forests, and rural areas) in the shortest time in order to …
various environments (eg, buildings, forests, and rural areas) in the shortest time in order to …
Medical image encryption algorithm based on Latin square and memristive chaotic system
X Chai, J Zhang, Z Gan, Y Zhang - Multimedia Tools and Applications, 2019 - Springer
Medical image encryption may help protect medical privacy. In this paper, we propose a new
medical image encryption scheme combined Latin square and chaotic system. The …
medical image encryption scheme combined Latin square and chaotic system. The …
Session key based fast, secure and lightweight image encryption algorithm
Nowadays, most of the communications in IoT enabled devices are done in the form of
images. To protect the images from intruders, there is a need for a secure encryption …
images. To protect the images from intruders, there is a need for a secure encryption …
[PDF][PDF] Exploring Image Representation and Color Spaces in Computer Vision: A Comprehensive Review
Indonesian Journal of Computer Science Page 1 Indonesian Journal of Computer Science
ISSN 2549-7286 (online) Jln. Khatib Sulaiman Dalam No. 1, Padang, Indonesia Website …
ISSN 2549-7286 (online) Jln. Khatib Sulaiman Dalam No. 1, Padang, Indonesia Website …
A fast color image encryption technique based on three dimensional chaotic map
In this paper, a fast color image encryption method based on the suggested three
dimensional chaotic map is presented. Generally, the suggested map generates three …
dimensional chaotic map is presented. Generally, the suggested map generates three …
Image encryption application in a system for compounding self-excited and hidden attractors
X Peng, Y Zeng - Chaos, Solitons & Fractals, 2020 - Elsevier
Nowadays, chaos-based encryption systems implemented by hardware attracted highly
attention. While chaotic systems, encryption algorithms and hardware platform are the core …
attention. While chaotic systems, encryption algorithms and hardware platform are the core …
Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover
In the current era, the majority of communication in IoT-enabled devices, such as
smartphones, is now done through images. To shield the images from invaders, a reliable …
smartphones, is now done through images. To shield the images from invaders, a reliable …
Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach
M Li, M Xu, J Luo, H Fan - IEEE Access, 2019 - ieeexplore.ieee.org
Recently, a novel gray image encryption scheme was proposed based on 2D Henon-Sine
map (2D-HSM) and DNA approach. In the original scheme, the image pixels are substituted …
map (2D-HSM) and DNA approach. In the original scheme, the image pixels are substituted …
Plaintext related optical image hybrid encryption based on fractional Fourier transform and generalized chaos of multiple controlling parameters
L Tao, X Liang, Z Wu, L Han, J Zhu - Journal of Grid Computing, 2023 - Springer
Combining optical image encryption with digital image encryption, we propose a composed
optical image hybrid encryption scheme in this paper. The scheme consists of two main …
optical image hybrid encryption scheme in this paper. The scheme consists of two main …