Chaos-based image encryption: Review, application, and challenges
B Zhang, L Liu - Mathematics, 2023 - mdpi.com
Chaos has been one of the most effective cryptographic sources since it was first used in
image-encryption algorithms. This paper closely examines the development process of …
image-encryption algorithms. This paper closely examines the development process of …
Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …
cryptography. Specifically, numerous research works have been focusing on chaotic image …
Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications
The security of healthcare and telemedicine systems is a critical issue that must be
significantly investigated. Several smart telemedicine applications are expected to be …
significantly investigated. Several smart telemedicine applications are expected to be …
Images encryption algorithm based on the quaternion multiplication and the XOR operation
M Boussif, N Aloui, A Cherif - Multimedia Tools and Applications, 2019 - Springer
In this paper, we propose an images encryption algorithm based on the quaternion
multiplication and the XOR function. The proposed algorithm processes the image in 32 …
multiplication and the XOR function. The proposed algorithm processes the image in 32 …
Chaotic Image Encryption: State-of-the-Art, Ecosystem, and the Promise of Quantum-Inspired AI
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …
cryptography. Specifically, numerous research works have been focusing on chaotic image …
[LIBRO][B] Crypto and AI: From Coevolution to Quantum Revolution
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …
cross-impact and potential between the two technologies. The authors first study the …
Crypto and AI
After some introductory discussions in Sect. 1.1, this chapter studies the role of AI in the
ecosystem of cryptography (Sect. 1.2). The chapter proceeds to study the role of …
ecosystem of cryptography (Sect. 1.2). The chapter proceeds to study the role of …
[PDF][PDF] Image Encryption: Sensitive Medical Scans Fibonacci Sequence, S-box and Tan Bessel Logistic Function
Y Hamed - 2022 - researchgate.net
Since image transmission via computer networks, especially the Internet, is develo** at a
rapid speed, the security of digital images has become a key concern. In this thesis, I am …
rapid speed, the security of digital images has become a key concern. In this thesis, I am …