Computational image encryption techniques: a comprehensive review
Images contain very sensitive and confidential information. Because images play a
significant role in many applications such as military communication, remote‐sensing, and …
significant role in many applications such as military communication, remote‐sensing, and …
Enhancement of the cast block algorithm based on novel S-box for image encryption
Background and Aim: due to the rapid growth of data communication and multimedia system
applications, security becomes a critical issue in the communication and storage of images …
applications, security becomes a critical issue in the communication and storage of images …
A robust bit-level image encryption based on Bessel map
A chaotic map plays a critical role in image encryption (IME). The map used to generate
chaotic sequences should perform high dynamic characteristics. In this study, a new chaotic …
chaotic sequences should perform high dynamic characteristics. In this study, a new chaotic …
2D eπ-map for image encryption
A chaotic map generally employed to generate chaotic sequence is key element for an
image encryption algorithm (IEA). In this study, an IEA using novel 2D chaotic map, which is …
image encryption algorithm (IEA). In this study, an IEA using novel 2D chaotic map, which is …
Modified whale optimization algorithm based on tent chaotic map** and its application in structural optimization
Y Li, M Han, Q Guo - KSCE Journal of Civil Engineering, 2020 - Springer
In this paper, a novel modified whale optimization algorithm based on Tent chaos map and
tournament selection strategy (MWOA) was presented. The aim of the improved algorithm is …
tournament selection strategy (MWOA) was presented. The aim of the improved algorithm is …
Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography
Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …
Cryptanalysis of an image block encryption algorithm based on chaotic maps
Y Ma, C Li, B Ou - Journal of Information Security and Applications, 2020 - Elsevier
Recently, an image block encryption algorithm was proposed based on some well-known
chaotic maps. The authors claim that the encryption algorithm achieves enough security …
chaotic maps. The authors claim that the encryption algorithm achieves enough security …
A controllable photosensitive neuron model and its application
In this paper, a controllable photosensitive neuron model is designed by incorporating two
phototubes in parallel in the FitzHugh–Nagumo neural circuit. The two phototubes are …
phototubes in parallel in the FitzHugh–Nagumo neural circuit. The two phototubes are …
A novel perturbation method to reduce the dynamical degradation of digital chaotic maps
L Liu, H **ang, X Li - Nonlinear Dynamics, 2021 - Springer
A chaotic map, which is realized on finite precision device, such as computer, will suffer
dynamical degradation. Such chaotic maps cannot be regarded as rigorous chaos anymore …
dynamical degradation. Such chaotic maps cannot be regarded as rigorous chaos anymore …
Optimized edge detection technique for brain tumor detection in MR images
Genetic algorithms (GAs) are intended to look for the optimum solution by eliminating the
gene strings with the worst fitness. Hence, this paper proposes an optimized edge detection …
gene strings with the worst fitness. Hence, this paper proposes an optimized edge detection …