Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …
cryptography. Specifically, numerous research works have been focusing on chaotic image …
Image encryption using hybrid chaotic map
Recently, great attention is paid to the use of chaotic maps in image encryption applications
due to their excellent randomness properties. In this paper, an efficient image encryption …
due to their excellent randomness properties. In this paper, an efficient image encryption …
Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment
W Jang, SY Lee - International Journal of Distributed Sensor …, 2020 - journals.sagepub.com
Concomitant with advances in technology, the number of systems and devices that utilize
image data has increased. Nowadays, image processing devices incorporated into systems …
image data has increased. Nowadays, image processing devices incorporated into systems …
A SURVEY OF THE MOST CURRENT IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES.
MAB Younes - … Journal of Advanced Research in Computer …, 2019 - search.ebscohost.com
Nowadays, the internet plays a key role in almost every aspect of life. This article presents a
new set of data storage and protection challenges. It shows a general introduction to …
new set of data storage and protection challenges. It shows a general introduction to …
[PDF][PDF] An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments.
Cyber security is a term utilized for describing a collection of technologies, procedures, and
practices that try protecting an online environment of a user or an organization. For medical …
practices that try protecting an online environment of a user or an organization. For medical …
Applying deep learning to known-plaintext attack on chaotic image encryption schemes
F Wang, J Sang, C Huang, B Cai… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
In this paper, we demonstrate that traditional chaotic encryption schemes are vulnerable to
the known-plaintext attack (KPA) with deep learning. Considering the decryption process as …
the known-plaintext attack (KPA) with deep learning. Considering the decryption process as …
Chaotic Image Encryption: State-of-the-Art, Ecosystem, and the Promise of Quantum-Inspired AI
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …
cryptography. Specifically, numerous research works have been focusing on chaotic image …
[LIBRO][B] Crypto and AI: From Coevolution to Quantum Revolution
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …
cross-impact and potential between the two technologies. The authors first study the …
Color images encryption by using bit plane crypt algorithm
M Tripathi, K Tomar, U Chauhan… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
Image Encryption method is used to provide security and privacy in various applications, by
using the process of a model to change initial format of an image (plaintext), into other …
using the process of a model to change initial format of an image (plaintext), into other …
Methodology for Image Cryptosystem Based on a Gray Code Number System.
BA Nathaniel - Computing & Information Systems, 2019 - search.ebscohost.com
Purpose: This paper presents a methodology for an image cryptosystem to ameliorate the
problems of many existing digital image cryptosystems. The cryptosystem is based on a gray …
problems of many existing digital image cryptosystems. The cryptosystem is based on a gray …