A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps
The third party misuse and manipulation of digital images is a treat to security and privacy of
human subjects. Image encryption in the internet of things era becomes more important with …
human subjects. Image encryption in the internet of things era becomes more important with …
Deep learning for iris recognition: a review
Y Yin, S He, R Zhang, H Chang, X Han… - arxiv preprint arxiv …, 2023 - arxiv.org
Iris recognition is a secure biometric technology known for its stability and privacy. With no
two irises being identical and little change throughout a person's lifetime, iris recognition is …
two irises being identical and little change throughout a person's lifetime, iris recognition is …
Remodeling randomness prioritization to boost-up security of RGB image encryption
BO Al-Roithy, A Gutub - Multimedia Tools and Applications, 2021 - Springer
Securing information became essential to exchange multimedia information safely. The
exchanged data need to be transformed in a well-managed, secure, and reliable manner. In …
exchanged data need to be transformed in a well-managed, secure, and reliable manner. In …
Color image compression-encryption using fractional-order hyperchaotic system and DNA coding
H Dong, E Bai, XQ Jiang, Y Wu - IEEE Access, 2020 - ieeexplore.ieee.org
Recently, many encryption algorithms based on fractional-order chaotic system have been
proposed to solve the problem of image encryption. In this paper, we propose a novel color …
proposed to solve the problem of image encryption. In this paper, we propose a novel color …
A fast image encryption algorithm based on improved 6-D hyper-chaotic system
H Chen, E Bai, X Jiang, Y Wu - IEEE Access, 2022 - ieeexplore.ieee.org
Aiming at the security and efficiency of image transmission, a fast image encryption
algorithm based on an improved 6-D chaotic system is proposed. Firstly, we design a hyper …
algorithm based on an improved 6-D chaotic system is proposed. Firstly, we design a hyper …
[HTML][HTML] PixAdapt: A novel approach to adaptive image encryption
Image encryption using genetic approach is a recent and advanced technique which has
grabbed attention in recent years. Currently, most image encryption algorithms (using …
grabbed attention in recent years. Currently, most image encryption algorithms (using …
Dynamic smart random preference for higher medical image confidentiality
A Gutub - Journal of Engineering Research, 2023 - kuwaitjournals.org
It is essential to secure the information to store or transfer digital files without destruction.
Currently, all used e-data requests to be utilized in well-controlled, protected, and …
Currently, all used e-data requests to be utilized in well-controlled, protected, and …
Smart fog-based video surveillance with privacy preservation based on blockchain
M Dave, V Rastogi, M Miglani, P Saharan… - Wireless Personal …, 2022 - Springer
Security surveillance of home or office premises is usually performed by deploying a number
of video cameras to continuously monitor the environment. Such monitoring has a potential …
of video cameras to continuously monitor the environment. Such monitoring has a potential …
Varying PRNG to improve image cryptography implementation
A Gutub, B Al-Roithy - Journal of Engineering Research, 2021 - kuwaitjournals.org
Securing information became essential to exchange multimedia information safely. These
exchanged data need to be transformed in a well-managed, secure and reliable manner. In …
exchanged data need to be transformed in a well-managed, secure and reliable manner. In …
Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map
A new method for the generation of pseudorandom numbers, based on two linear feedback
shift registers (LFSRs) and a discrete-space chaotic map is presented. The proposed …
shift registers (LFSRs) and a discrete-space chaotic map is presented. The proposed …