Computational image encryption techniques: a comprehensive review
Images contain very sensitive and confidential information. Because images play a
significant role in many applications such as military communication, remote‐sensing, and …
significant role in many applications such as military communication, remote‐sensing, and …
Lightweight encryption technique to enhance medical image security on internet of medical things applications
The importance of image security in the field of medical imaging is challenging. Several
research works have been conducted to secure medical healthcare images. Encryption, not …
research works have been conducted to secure medical healthcare images. Encryption, not …
Secure and energy efficient-based E-health care framework for green internet of things
This paper proposes a secure and energy-efficient Internet of Things (IoT) model for e-
health. The main objective is to secure the transmission and retrieval of biomedical images …
health. The main objective is to secure the transmission and retrieval of biomedical images …
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …
A new algorithm for digital image encryption based on chaos theory
In recent decades, image encryption, as one of the significant information security fields, has
attracted many researchers and scientists. However, several studies have been performed …
attracted many researchers and scientists. However, several studies have been performed …
A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks
M Zhou, C Wang - Signal Processing, 2020 - Elsevier
Dissipative chaotic systems have been widely used in digital image encryption schemes in
the past 20 years. However, compared to conservative chaotic systems, the dissipative …
the past 20 years. However, compared to conservative chaotic systems, the dissipative …
A new color image encryption scheme based on 2DNLCML system and genetic operations
YQ Zhang, Y He, P Li, XY Wang - Optics and Lasers in Engineering, 2020 - Elsevier
Based on the spatiotemporal chaos of the two Dimensional Nonlinear Coupled Map Lattices
(2DNLCML) and genetic operations, a new optical color image encryption scheme is …
(2DNLCML) and genetic operations, a new optical color image encryption scheme is …
Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption
Image encryption is one of the important methods for preservation of confidentiality and
integrity of digital images. In this paper, a color image cryptosystem based on improved …
integrity of digital images. In this paper, a color image cryptosystem based on improved …
An image encryption method based on elliptic curve elgamal encryption and chaotic systems
Y Luo, X Ouyang, J Liu, L Cao - IEEE Access, 2019 - ieeexplore.ieee.org
Due to the potential security problem about key management and distribution for the
symmetric image encryption schemes, a novel asymmetric image encryption method is …
symmetric image encryption schemes, a novel asymmetric image encryption method is …
Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map
The secure key generation is the predominant requirement of an image encryption. Chaotic
maps are often considered by the researchers for secure key generation. However, chaotic …
maps are often considered by the researchers for secure key generation. However, chaotic …