A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps

PS Sneha, S Sankar, AS Kumar - Journal of Ambient Intelligence and …, 2020 - Springer
The third party misuse and manipulation of digital images is a treat to security and privacy of
human subjects. Image encryption in the internet of things era becomes more important with …

Deep learning for iris recognition: a review

Y Yin, S He, R Zhang, H Chang, X Han… - arxiv preprint arxiv …, 2023 - arxiv.org
Iris recognition is a secure biometric technology known for its stability and privacy. With no
two irises being identical and little change throughout a person's lifetime, iris recognition is …

Remodeling randomness prioritization to boost-up security of RGB image encryption

BO Al-Roithy, A Gutub - Multimedia Tools and Applications, 2021 - Springer
Securing information became essential to exchange multimedia information safely. The
exchanged data need to be transformed in a well-managed, secure, and reliable manner. In …

Color image compression-encryption using fractional-order hyperchaotic system and DNA coding

H Dong, E Bai, XQ Jiang, Y Wu - IEEE Access, 2020 - ieeexplore.ieee.org
Recently, many encryption algorithms based on fractional-order chaotic system have been
proposed to solve the problem of image encryption. In this paper, we propose a novel color …

A fast image encryption algorithm based on improved 6-D hyper-chaotic system

H Chen, E Bai, X Jiang, Y Wu - IEEE Access, 2022 - ieeexplore.ieee.org
Aiming at the security and efficiency of image transmission, a fast image encryption
algorithm based on an improved 6-D chaotic system is proposed. Firstly, we design a hyper …

[HTML][HTML] PixAdapt: A novel approach to adaptive image encryption

R Tuli, HN Soneji, P Churi - Chaos, Solitons & Fractals, 2022 - Elsevier
Image encryption using genetic approach is a recent and advanced technique which has
grabbed attention in recent years. Currently, most image encryption algorithms (using …

Dynamic smart random preference for higher medical image confidentiality

A Gutub - Journal of Engineering Research, 2023 - kuwaitjournals.org
It is essential to secure the information to store or transfer digital files without destruction.
Currently, all used e-data requests to be utilized in well-controlled, protected, and …

Smart fog-based video surveillance with privacy preservation based on blockchain

M Dave, V Rastogi, M Miglani, P Saharan… - Wireless Personal …, 2022 - Springer
Security surveillance of home or office premises is usually performed by deploying a number
of video cameras to continuously monitor the environment. Such monitoring has a potential …

Varying PRNG to improve image cryptography implementation

A Gutub, B Al-Roithy - Journal of Engineering Research, 2021 - kuwaitjournals.org
Securing information became essential to exchange multimedia information safely. These
exchanged data need to be transformed in a well-managed, secure and reliable manner. In …

Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map

HS Alhadawi, MF Zolkipli, SM Ismail, D Lambić - Cryptologia, 2019 - Taylor & Francis
A new method for the generation of pseudorandom numbers, based on two linear feedback
shift registers (LFSRs) and a discrete-space chaotic map is presented. The proposed …