A gray image encryption technique using the concept of water waves, chaos and hash function

A Firdous, AU Rehman, MMS Missen - Ieee Access, 2021 - ieeexplore.ieee.org
In this article, an innovative encryption technique is developed by getting the inspiration from
the natural up-down water wave's phenomena that changes a reflection on pond's surface …

Intertwining logistic map and Cellular Automata based color image encryption model

M Kumar, S Kumar, R Budhiraja… - … in information and …, 2016 - ieeexplore.ieee.org
In this paper a color image encryption involving pixel confusion and diffusion governed by
three different series generated by intertwining logistic map is proposed. This symmetric …

Blood vessel segmentation in pathological retinal image

Z Han, Y Yin, X Meng, G Yang… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Retinal vessel segmentation is a fundamental aspect of the automatic retinal image analysis.
The attributes of retinal blood vessels, such as width, tortuosity and branching pattern, play …

Breaking row-column shuffle based image cipher

W Li, Y Yan, N Yu - Proceedings of the 20th ACM international …, 2012 - dl.acm.org
In this paper, a redundancy based cipher-only attack is proposed to break row-column
shuffle based image encryption algorithms, which are considered to be safe under cipher …

A new diffusion and substitution based cryptosystem for securing medical image applications

L Mancy, SMC Vigila - International Journal of Electronic …, 2018 - inderscienceonline.com
Due to the rising privilege for tele-health facilities have sophisticated responsiveness in the
usage of medicinal image safeguard proficiency. It mainly compact with patient records that …

[PDF][PDF] Inbuilt image encryption and steganography security solutions for wireless systems: a survey

P Praveenkumar, K Thenmozhi… - Research Journal of …, 2017 - researchgate.net
It is increasingly difficult to ensure the sharing of secret information due to uncontrolled
technology explosion. In particular, the field of communication engineering has undergone a …

Permutation of image encryption system based on block cipher and stream cipher encryption algorithm

H Chunguang, C Hai, S Yu… - 2015 Third International …, 2015 - ieeexplore.ieee.org
In recent years, a variety of encryption algorithms have been investigated to image
cryptosystems. Most of them are based on permutation and diffusion architecture. These two …

Generation and analysis of graphical codes using textured patterns for printed document authentication

I Tkachenko - 2015 - theses.hal.science
Due to the development and availability of printing and scanning devices, the number of
forged/counterfeited valuable documents and product packages is increasing. Therefore …

An image encryption scheme based on concatenated torus automorphisms

Q Mao, CC Chang, HL Wu - KSII Transactions on Internet and …, 2013 - koreascience.kr
A novel, chaotic map that is based on concatenated torus automorphisms is proposed in this
paper. As we know, cat map, which is based on torus automorphism, is highly chaotic and is …

[PDF][PDF] Speed image encryption scheme using dynamic Galois field GF (P) matrices

H Bahjat, MA Salih - International Journal of Computer Applications, 2014 - academia.edu
Encryption security and encryption speed are two important aspects of image encryption
algorithms. Due to their increasingly large size, video images present a great challenge to …