Chaos-based image encryption: Review, application, and challenges

B Zhang, L Liu - Mathematics, 2023 - mdpi.com
Chaos has been one of the most effective cryptographic sources since it was first used in
image-encryption algorithms. This paper closely examines the development process of …

Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications

W El-Shafai, F Khallaf, ESM El-Rabaie… - Journal of Ambient …, 2021 - Springer
The security of healthcare and telemedicine systems is a critical issue that must be
significantly investigated. Several smart telemedicine applications are expected to be …

Images encryption algorithm based on the quaternion multiplication and the XOR operation

M Boussif, N Aloui, A Cherif - Multimedia Tools and Applications, 2019 - Springer
In this paper, we propose an images encryption algorithm based on the quaternion
multiplication and the XOR function. The proposed algorithm processes the image in 32 …

Chaotic Image Encryption: State-of-the-Art, Ecosystem, and the Promise of Quantum-Inspired AI

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

[LIBRO][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …

Crypto and AI

B Zolfaghari, H Nemati, N Yanai, K Bibak - Springer
After some introductory discussions in Sect. 1.1, this chapter studies the role of AI in the
ecosystem of cryptography (Sect. 1.2). The chapter proceeds to study the role of …

[PDF][PDF] Image Encryption: Sensitive Medical Scans Fibonacci Sequence, S-box and Tan Bessel Logistic Function

Y Hamed - 2022 - researchgate.net
Since image transmission via computer networks, especially the Internet, is develo** at a
rapid speed, the security of digital images has become a key concern. In this thesis, I am …