An overview of encryption algorithms in color images

HM Ghadirli, A Nodehi, R Enayatifar - Signal Processing, 2019 - Elsevier
Nowadays, security in data transfer is of special importance. Images are of the most
attractive kinds of data in the encryption domain. Color images are more attractive than the …

[HTML][HTML] Cosine-transform-based chaotic system for image encryption

Z Hua, Y Zhou, H Huang - Information Sciences, 2019 - Elsevier
Chaos is known as a natural candidate for cryptography applications owing to its properties
such as unpredictability and initial state sensitivity. However, certain chaos-based …

Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory

X Wang, S Gao - Information sciences, 2020 - Elsevier
This paper studies chaotic image encryption technology and an application of matrix semi-
tensor product theory, and a Boolean network encryption algorithm for a synchronous …

A new hybrid digital chaotic system with applications in image encryption

M Alawida, A Samsudin, JS Teh, RS Alkhawaldeh - Signal Processing, 2019 - Elsevier
Image encryption provides confidentiality to images by transforming them into
unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to …

A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its' applications in image encryption

X Liu, X Tong, Z Wang, M Zhang - Chaos, Solitons & Fractals, 2022 - Elsevier
In view of the problem that dissipative chaos has attractors and is easy to be attacked by
reconstruction, which leads to the security defects of encryption algorithm based on …

A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient

X Wang, J Yang - Information Sciences, 2021 - Elsevier
This paper proposes a new tent-multi dynamic piecewise coupled map** lattice
(TMDPCML). Through the comprehensive analysis of the performance test results …

Image encryption using 2D Logistic-adjusted-Sine map

Z Hua, Y Zhou - Information Sciences, 2016 - Elsevier
With complex properties of ergodicity, unpredictability and sensitivity to initial states, chaotic
systems are widely used in cryptography. This paper proposes a two-dimensional Logistic …

2D Sine Logistic modulation map for image encryption

Z Hua, Y Zhou, CM Pun, CLP Chen - Information Sciences, 2015 - Elsevier
Because of the excellent properties of unpredictability, ergodicity and sensitivity to their
parameters and initial values, chaotic maps are widely used in security applications. In this …

DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things

Y Ding, G Wu, D Chen, N Zhang, L Gong… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) can connect many medical imaging equipment to the
medical information network to facilitate the process of diagnosing and treating doctors. As …

A fast image encryption algorithm based on chaotic map

W Liu, K Sun, C Zhu - Optics and Lasers in Engineering, 2016 - Elsevier
Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-
dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop …