A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution
Privacy is a serious concern related to sharing videos or images among people over the
Internet. As a method to preserve images' privacy, chaos-based image encryption algorithms …
Internet. As a method to preserve images' privacy, chaos-based image encryption algorithms …
A fast text-to-image encryption-decryption algorithm for secure network communication
Data security is the science of protecting data in information technology, including
authentication, data encryption, data decryption, data recovery, and user protection. To …
authentication, data encryption, data decryption, data recovery, and user protection. To …
Image encryption using a novel hybrid chaotic map and dynamic permutation− diffusion
In last few years, chaotic maps are being used extensively by the researchers to build image
cryptosystems. This paper proposes a novel Hybrid chaotic map, and discusses the …
cryptosystems. This paper proposes a novel Hybrid chaotic map, and discusses the …
A review paper: Text-to-image cryptography in color coding
Encryption techniques are important on the Internet. The challenges of color-coding are still
hot topics. Many papers were published to develop encryption algorithms to prevent security …
hot topics. Many papers were published to develop encryption algorithms to prevent security …
A highly secured image encryption scheme using quantum walk and chaos
The use of multimedia data sharing has drastically increased in the past few decades due to
the revolutionary improvements in communication technologies such as the 4th generation …
the revolutionary improvements in communication technologies such as the 4th generation …
Vigenère Implemented in Two Chaotic Feistel Laps for Medical Images Encryption Followed by Genetic Mutation
A Abdellah, M Jarjar, A Benazzi, A Jarjar… - … Conference on Artificial …, 2022 - Springer
In this work, we will propose a new method for medical image encryption based on Vigenère
injection into two greatly improved Feistel rounds, followed by a chaotic mutation applied to …
injection into two greatly improved Feistel rounds, followed by a chaotic mutation applied to …
Key image generation using piecewise linear chaotic maps and MD5 hashing
In some cases, sensitive images may be shared for research, consultation, or collaboration
purposes. These images often need to be stored for extended periods, sometimes decades …
purposes. These images often need to be stored for extended periods, sometimes decades …
[PDF][PDF] System and Method to Provide a Keyless Mechanism to Encrypt/Decrypt Memory Context
A Rai, P Kumari, N Rai - researchgate.net
In contemporary computing environments, safeguarding sensitive data is of paramount
importance. Traditional encryption methods often rely on keys, which themselves pose …
importance. Traditional encryption methods often rely on keys, which themselves pose …
[PDF][PDF] Design of Pseudo Random Generator Using Nonlinear Dynamical Systems and Its Applications to Digital Image Security
When people share data or images online, privacy is one of the main issues raised. Image
encryption techniques created on chaos have frequently been used to meet such …
encryption techniques created on chaos have frequently been used to meet such …