An efficient image encryption technique based on two-level security for internet of things

M Gupta, VP Singh, KK Gupta, PK Shukla - Multimedia Tools and …, 2023 - Springer
This paper proposes an efficient image encryption method based on a hybrid of
watermarking and cryptographic techniques. It is based on two-level security for the secure …

A new image encryption based on bit replacing, chaos and DNA coding techniques

SF Yousif, AJ Abboud, RS Alhumaima - Multimedia Tools and Applications, 2022 - Springer
Millions of confidential images are transmitted every day by people through the multimedia
systems of the internet. Such confidential information in the images may be belong to the …

Protection of image ROI using chaos-based encryption and DCNN-based object detection

W Song, C Fu, Y Zheng, L Cao, M Tie… - Neural Computing and …, 2022 - Springer
Images always contain sensitive information, eg, a clear face on a photo, which needs to be
protected. The simple way is to encrypt the whole image for hiding “everything” securely, but …

Image encryption model based on novel magic square with differential encoding and chaotic map

N Rani, V Mishra, SR Sharma - Nonlinear Dynamics, 2023 - Springer
In this paper, an encryption model for the grayscale and color images based on novel magic
square, and differential encoding technique along with chaotic map has been proposed. The …

An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for internet of multimedia things

M Gupta, KK Gupta, MR Khosravi, PK Shukla… - Wireless Personal …, 2021 - Springer
Due to the increasing demand for IoMT applications in numerous fields such as healthcare,
smart city, smart grids, industrial internet, etc. The privacy and security become a major issue …

Grayscale and colored image encryption model using a novel fused magic cube

N Rani, SR Sharma, V Mishra - Nonlinear Dynamics, 2022 - Springer
In this paper, a novel method for the construction of a fused magic cube of composite order
has been proposed by using the concept of compounding. The replacement of each block …

Privacy protection in surveillance videos using block scrambling-based encryption and DCNN-based face detection

KM Hosny, MA Zaki, HM Hamza, MM Fouda… - IEEE …, 2022 - ieeexplore.ieee.org
Surely surveillance cameras are certainly important in all aspects of life. We have become in
an era where we need to use surveillance cameras everywhere, homes, schools, banks …

Session key based fast, secure and lightweight image encryption algorithm

M Gupta, KK Gupta, PK Shukla - Multimedia Tools and Applications, 2021 - Springer
Nowadays, most of the communications in IoT enabled devices are done in the form of
images. To protect the images from intruders, there is a need for a secure encryption …

An efficient chaos-based image encryption algorithm using real-time object detection for smart city applications

KN Singh, OP Singh, N Baranwal, AK Singh - … Energy Technologies and …, 2022 - Elsevier
Currently, an increasing number of digital images are being generated by and for the
general public and professionals. Simultaneously, the protection of these images is crucial …

[HTML][HTML] Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption

Y Lu, M Gong, L Cao, Z Gan, X Chai, A Li - Journal of King Saud University …, 2023 - Elsevier
At present, some image compression and encryption algorithms have been presented to
protect digital images by combining chaos and compressed sensing (CS). However, some of …