IEHC: An efficient image encryption technique using hybrid chaotic map

K Kumar, S Roy, U Rawat, S Malhotra - Chaos, Solitons & Fractals, 2022 - Elsevier
Image encryption is essential for the transmission of the sensitive images through insecure
channels used in wired or wireless communication nowadays. With the advent of cloud …

Analysis and computation of encryption technique to enhance security of medical images

BD Parameshachari, HT Panduranga… - IOP conference …, 2020 - iopscience.iop.org
Recently, there are many advanced techniques used in the medical fields, such as smart
health, e-health and telemedicine applications. These techniques rely on open source …

Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption

J Khan, GA Khan, JP Li, MF AlAjmi… - Scientific …, 2022 - Wiley Online Library
The technological progression is raised as a hybrid ecosystem with the industrial Internet of
Things (IIoT). Among them, healthcare is also broadly unified with the Internet of Things to …

Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation

Z Liang, Q Qin, C Zhou, N Wang, Y Xu, W Zhou - PloS one, 2021 - journals.plos.org
Current image encryption methods have many shortcomings for the medical image
encryption with high resolution, strong correlation and large storage space, and it is difficult …

A gray image encryption technique using the concept of water waves, chaos and hash function

A Firdous, AU Rehman, MMS Missen - Ieee Access, 2021 - ieeexplore.ieee.org
In this article, an innovative encryption technique is developed by getting the inspiration from
the natural up-down water wave's phenomena that changes a reflection on pond's surface …

A Review of Genome to Chaos: Exploring DNA Dynamics in Security

S Aashiq Banu, LK Rao, PS Priya… - Multimedia Tools and …, 2024 - Springer
One of the largest and fastest-growing industries globally is e-healthcare. Digital medical
imaging constantly evolves, advancing from standard computed tomography to powerful …

Secured compression for 2D medical images through the manifold and fuzzy trapezoidal correlation function

PN Srinivasu, N Norwawi, SS Amiripalli… - … University Journal of …, 2021 - dergipark.org.tr
In biomedical imaging, the imaging of secured storage and maintaining medical images like
MRI, CT, and ultrasound scans are challenging with ever-growing tremendous image data …

A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography

J Liu, Y Wang, Q Han, J Gao - International Journal of Bifurcation …, 2022 - World Scientific
Chaotic maps have been widely used in image encryption due to their complexity,
pseudorandomness and high sensitivity to initial values. In this paper, an image encryption …

Efficient secure surveillance on smart healthcare IoT system through cosine-transform encryption

J Khan, JP Li, AU Haq, GA Khan… - Journal of Intelligent …, 2021 - content.iospress.com
The emerging technologies with IoT (Internet of Things) systems are elevated as a prototype
and combination of the smart connectivity ecosystem. These ecosystems are appropriately …

[PDF][PDF] Image encryption algorithm based on substitution principle and shuffling scheme

A Hamad, AK Farhan - Engineering and Technology Journal, 2020 - iasj.net
The dynamic progression in multimedia and communication industry attracted an increased
concern in regards to digital image security which are being sent via open or stored …