Secure image encryption using chaotic, hybrid chaotic and block cipher approach
Secure image transmission is one of the most challenging problems in the age of
communication technology. Millions of people use and transfer images for either personal or …
communication technology. Millions of people use and transfer images for either personal or …
A new fast double-chaotic based Image encryption scheme
RI Abdelfatah - Multimedia Tools and Applications, 2020 - Springer
In this paper, a new scheme for image encryption based on a double chaotic pseudo
random generator (DCPG), simple XOR and shift rotations operations is proposed. The …
random generator (DCPG), simple XOR and shift rotations operations is proposed. The …
Encryption for multimedia based on chaotic map: Several scenarios
This paper proposes several efficient techniques for multimedia encryption based on a
chaotic map. The proposed techniques use four types of chaotic maps and make …
chaotic map. The proposed techniques use four types of chaotic maps and make …
Enhancing Image Security with Rossler Attractor-Based Encryption
we introduced image encryption algorithms with high sensitivity, such that even a single
alteration in a plain-text image would result in a complete transformation of the ciphered …
alteration in a plain-text image would result in a complete transformation of the ciphered …
[PDF][PDF] A review on multiple chaotic maps for image encryption with cryptographic technique
G Chandra, N Chandra, S Verma - International Journal of Computer …, 2015 - academia.edu
In the present time, Due to the rapid growth of digital communication and multimedia
application, security becomes an important issue of communication, storage and …
application, security becomes an important issue of communication, storage and …
[PDF][PDF] Image scrambling algorithm based on image block and zigzag transformation
C Pu - Comput Model New Technol, 2015 - cmnt.lv
Image scrambling has wide application field in the protection of image information and
secret. To achieve a satisfactory level of security, this paper introduces a color image …
secret. To achieve a satisfactory level of security, this paper introduces a color image …
Digital sound encryption with logistic map and number theoretic transform
Digital sound security has limits on encrypting in Frequency Domain. Number Theoretic
Transform based on field (GF 2 521–1) improve and solve that problem. The algorithm for …
Transform based on field (GF 2 521–1) improve and solve that problem. The algorithm for …
[PDF][PDF] A review of image encryption using chaos based techniques
S Chand, R Aggarwal, E Dubey - International Journal of Science …, 2015 - academia.edu
In open communication network, it is utmost crucial to keep sensitive information protected
from becoming vulnerable to unauthorized access. Encryption process provides high …
from becoming vulnerable to unauthorized access. Encryption process provides high …
[PDF][PDF] Efficient Multi-Secret Digital Images Steganography
HM Sidqi - Egyptian Computer Science Journal, 2020 - academia.edu
The new conceptions of more than one secret message and false digital image
steganography are presented in the current paper. One of the major ideas in these …
steganography are presented in the current paper. One of the major ideas in these …
[PDF][PDF] Image Encryption Approach based on Chaotic Image Random Key Generating
AD Khalaf, AM Sagheer - researchgate.net
An image encryption approach is proposed in this paper. Initial random numbers are
generated by linear dynamic system which has a chaotic map**. Lorenz map can give us …
generated by linear dynamic system which has a chaotic map**. Lorenz map can give us …