Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

Image encryption using hybrid chaotic map

HN Abdullah, HA Abdullah - 2017 International conference on …, 2017 - ieeexplore.ieee.org
Recently, great attention is paid to the use of chaotic maps in image encryption applications
due to their excellent randomness properties. In this paper, an efficient image encryption …

Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment

W Jang, SY Lee - International Journal of Distributed Sensor …, 2020 - journals.sagepub.com
Concomitant with advances in technology, the number of systems and devices that utilize
image data has increased. Nowadays, image processing devices incorporated into systems …

A SURVEY OF THE MOST CURRENT IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES.

MAB Younes - … Journal of Advanced Research in Computer …, 2019 - search.ebscohost.com
Nowadays, the internet plays a key role in almost every aspect of life. This article presents a
new set of data storage and protection challenges. It shows a general introduction to …

[PDF][PDF] An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments.

AS Jamil, RA Azeez, NF Hassan - International Journal of Online & …, 2023 - researchgate.net
Cyber security is a term utilized for describing a collection of technologies, procedures, and
practices that try protecting an online environment of a user or an organization. For medical …

Applying deep learning to known-plaintext attack on chaotic image encryption schemes

F Wang, J Sang, C Huang, B Cai… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
In this paper, we demonstrate that traditional chaotic encryption schemes are vulnerable to
the known-plaintext attack (KPA) with deep learning. Considering the decryption process as …

Chaotic Image Encryption: State-of-the-Art, Ecosystem, and the Promise of Quantum-Inspired AI

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

[LIBRO][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …

Color images encryption by using bit plane crypt algorithm

M Tripathi, K Tomar, U Chauhan… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
Image Encryption method is used to provide security and privacy in various applications, by
using the process of a model to change initial format of an image (plaintext), into other …

Methodology for Image Cryptosystem Based on a Gray Code Number System.

BA Nathaniel - Computing & Information Systems, 2019 - search.ebscohost.com
Purpose: This paper presents a methodology for an image cryptosystem to ameliorate the
problems of many existing digital image cryptosystems. The cryptosystem is based on a gray …