A survey of image encryption algorithms

M Kumari, S Gupta, P Sardana - 3D Research, 2017 - Springer
Security of data/images is one of the crucial aspects in the gigantic and still expanding
domain of digital transfer. Encryption of images is one of the well known mechanisms to …

An image encryption method based on chaos system and AES algorithm

A Arab, MJ Rostami, B Ghavami - The Journal of Supercomputing, 2019 - Springer
In this paper, a novel image encryption algorithm is proposed based on the combination of
the chaos sequence and the modified AES algorithm. In this method, the encryption key is …

[PDF][PDF] Image encryption using different techniques: A review

KD Patel, S Belani - International Journal of Emerging Technology …, 2011 - researchgate.net
In present times, the protection of multimedia data is becoming very important. The
protection of this multimedia data can be done with encryption. There are so many different …

A RGB image encryption algorithm based on total plain image characteristics and chaos

MA Murillo-Escobar, C Cruz-Hernández… - Signal Processing, 2015 - Elsevier
Currently, color image encryption is important to ensure its confidentiality during its
transmission on insecure networks or its storage. The fact that chaotic properties are related …

Privacy-aware and security-enhanced efficient matchmaking encryption

J Sun, G Xu, T Zhang, X Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data sharing technologies enable users to outsource data and privately share information
with arbitrary recipients without geographic barriers. However, existing efforts for secure …

A novel hybrid encryption algorithm based on chaos and S-AES algorithm

Ü Çavuşoğlu, S Kaçar, A Zengin, I Pehlivan - Nonlinear Dynamics, 2018 - Springer
In this study, a novel chaos-based hybrid encryption algorithm design for secure and
effective image encryption is presented. To design the algorithm, the Zhongtang chaotic …

Secure and fast image encryption algorithm based on modified logistic map

M Riaz, H Dilpazir, S Naseer, H Mahmood, A Anwar… - Information, 2024 - mdpi.com
In the past few decades, the transmission of data over an unsecure channel has resulted in
an increased rate of hacking. The requirement to make multimedia data more secure is …

A novel bit permutation-based image encryption algorithm

SF Raza, V Satpute - Nonlinear Dynamics, 2019 - Springer
In recent years, substantial work has been done for develo** image encryption algorithms.
Image encryption requires handling of large data, which needs computationally efficient …

Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds

J Sun, G Xu, T Zhang, X Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The cloud-based data sharing technology with cryptographic primitives enables data owners
to outsource data into paradigms and privately share information with arbitrary recipients …

High throughput and low area architectures of secure IoT algorithm for medical image encryption

Z Mishra, B Acharya - Journal of Information Security and Applications, 2020 - Elsevier
The favor that lightweight encryption algorithms have gained over the recent years regarding
data and image security in a resource constrained environment of the smart device sort in …