2d lorentz chaotic model coupled with logistic chaotic model for medical image encryption: Towards ensuring security for teleradiology

S John, SN Kumar - Procedia Computer Science, 2023 - Elsevier
Medical images play pivotal role in health care sector for disease diagnosis and therapeutic
planning. Encryption algorithms are widely used in medical image processing for ensuring …

[PDF][PDF] A new chaotic image cryptosystem based on plaintext-associated mechanism and integrated confusion-diffusion operation

AK Shibeeb, MH Ahmed, AH Mohammed - Karbala International Journal of …, 2021 - iasj.net
In modern chaotic image cryptosystems, the initial values generated for the chaotic system
are carried out based on the hash function or summation result of the image pixels. Also, the …

Enhanced chaos-based image compression-encryption algorithm utilizing 2D compressive sensing and genetic algorithm optimization

A Nanfak, J de Dieu Nkapkop, J Mvogo Ngono… - Multimedia Tools and …, 2024 - Springer
This paper introduces an innovative image compression and encryption algorithm that
leverages the genetic algorithm (GA), compressive sensing (CS), and a newly developed …

Multilayered highly secure authentic watermarking mechanism for medical applications

S Dhall, S Gupta - Multimedia Tools and Applications, 2021 - Springer
Telemedicine is a technology-based substitute for conventional health care facilities. It
symbolizes the practice of medication via indirect means. The foremost requirement for such …

Image encryption algorithm based on timeout, pixel transposition and modified fisher-yates shuffling

S Sharma, A Kumar, N Hada, G Choudhary… - … on Advancements in …, 2022 - Springer
Social media has become an inseparable part of our lives which has increased the sharing
of images across multiple platforms. To enhance the security, various image encryption …

Multi‐chaotic maps and blockchain based image encryption

T Kumari, D Singh, B Singh - Concurrency and Computation …, 2024 - Wiley Online Library
The vast technological developments make data transmission more frequent over networks.
So, the data needs to be secured and for that reason, there is a requirement to develop an …

Improve The Security of The Vigenère Cypher Algorithm by Modifying the Encoding Table and Key

AP Sidik - International Journal of Basic and Applied Science, 2021 - ijobas.pelnus.ac.id
This investigation was conducted to move forward the security of the vigenère cypher
calculation by tending to the key conveyance issue and the most key issue within the …

Quantum image cryptography based on continuous chaotic maps

SM Satre, B Joshi - Microsystem Technologies, 2024 - Springer
Images are significant data carriers because they are more challenging to transfer or store
securely than text data because they include large amounts of digital data with high …

An optimized image encryption framework with chaos theory and EMO approach

M Roy, S Chakraborty, K Mali - Multimedia Tools and Applications, 2023 - Springer
Security of digital data is one of the prime concerns of advanced data communication
technologies. Images possess a major share of the overall data communication. Image data …

Design of area, energy and security optimized reversible architectures for digital image cryptography

K Saranya, KN Vijeyakumar - Circuits, Systems, and Signal Processing, 2023 - Springer
Image data is frequently processed in multimedia, wireless, mobile communication etc. The
digital images transmitted over the internet are prone to security threats and thus providing …