An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map

P Ramasamy, V Ranganathan, S Kadry… - Entropy, 2019 - mdpi.com
Nowadays, the images are transferred through open channels that are subject to potential
attacks, so the exchange of image data requires additional security in many fields, such as …

Image encryption algorithm based on logistic and two-dimensional lorenz

T Li, B Du, X Liang - Ieee Access, 2020 - ieeexplore.ieee.org
In recent years, experts and scholars in the field of information security have attached great
importance to the security of image information. They have proposed many image …

An image encryption approach based on chaotic maps and genetic operations

Y Niu, Z Zhou, X Zhang - Multimedia Tools and Applications, 2020 - Springer
This paper puts forward an image encryption approach using chaotic maps and genetic
operations. First, the Keccak algorithm is employed to compute the hash values of a plain …

[HTML][HTML] A new cryptographic algorithm via a two-dimensional chaotic map

A Elghandour, A Salah, A Karawia - Ain Shams Engineering Journal, 2022 - Elsevier
In this paper, a new cryptographic algorithm using a two-dimensional piecewise smooth
nonlinear chaotic map is suggested. It depends on the confusion-diffusion model …

Parallel strength Pareto evolutionary algorithm‐II based image encryption

M Kaur, D Singh, R Singh Uppal - IET Image Processing, 2020 - Wiley Online Library
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …

Ring oscillator as confusion–diffusion agent: a complete TRNG drove image security

R Sivaraman, S Rajagopalan… - IET Image …, 2020 - Wiley Online Library
The utility of true random number generators (TRNGs) is not only restricted to session key
generation, nonce generation, OTP generation etc. in cryptography. In the proposed work …

An algorithm of image encryption using logistic and two-dimensional chaotic economic maps

SS Askar, AA Karawia, A Al-Khedhairi, FS Al-Ammar - Entropy, 2019 - mdpi.com
In the literature, there are many image encryption algorithms that have been constructed
based on different chaotic maps. However, those algorithms do well in the cryptographic …

Image encryption scheme with compressed sensing based on new three-dimensional chaotic system

Y **e, J Yu, S Guo, Q Ding, E Wang - Entropy, 2019 - mdpi.com
In this paper, a new three-dimensional chaotic system is proposed for image encryption. The
core of the encryption algorithm is the combination of chaotic system and compressed …

Chua's diode and strange attractor: a three‐layer hardware–software co‐design for medical image confidentiality

S Rajagopalan, S Poori, M Narasimhan… - IET Image …, 2020 - Wiley Online Library
Medical image security relies upon the arrival of improved techniques for enhancing the
confusion as well as diffusion processes in the pixel level manipulations. Non‐linear circuits …

Quantum-resistant cryptography for the internet of things based on location-based lattices

OS Althobaiti, M Dohler - IEEE Access, 2021 - ieeexplore.ieee.org
An important enabler of the Internet of Things (IoT) is the Narrow-Band Internet of Things
(NB-IoT) technology, which is a 3GPP standards compliant connectivity solution. Quantum …