Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation

NR Zhou, LJ Tong, WP Zou - Signal Processing, 2023 - Elsevier
With quaternion theory, the traditional discrete fractional Tchebyshev transform is extended
to the quaternion algebra domain for multi-image processing. A new multi-image encryption …

Image Encryption via Base-n PRNGs and Parallel Base-n S-Boxes

M Gabr, R Elias, KM Hosny, GA Papakostas… - IEEE …, 2023 - ieeexplore.ieee.org
The fast-paced advancement in multimedia production and exchanges over unsecured
networks have led to a dire need to develop security applications. In this regard, chaos …

A survey of image encryption algorithms based on chaotic system

P Fang, H Liu, C Wu, M Liu - The Visual Computer, 2023 - Springer
Many researchers have devoted themselves to studying image encryption based on chaotic
system and have made significant strides in research in recent decades. This paper first …

Multimedia security using encryption: A survey

KM Hosny, MA Zaki, NA Lashin, MM Fouda… - IEEE …, 2023 - ieeexplore.ieee.org
Considering the current dependency on digital technology in modern society, the protection
of multimedia is highly important. Encryption is vital in modern digital communication …

Image encryption based on 8D hyperchaotic system using Fibonacci Q-Matrix

G Biban, R Chugh, A Panwar - Chaos, Solitons & Fractals, 2023 - Elsevier
One of the key tenets of the enormous and still-expanding digital realm is the security of
images. In recent years, the interest in image encryption has increased among researchers …

Adaptive reversible image-data hiding algorithm based on blockchain and zero watermarking

G Ye, Z Chen, X Huang - Optics & Laser Technology, 2024 - Elsevier
An adaptive reversible image-data hiding (ARIdH) algorithm is proposed. First, the variance
of the secret plain image is calculated and taken as feature values, by a new integer …

[HTML][HTML] Efficient and secure image encryption using key substitution process with discrete wavelet transform

MU Rehman, A Shafique, KH Khan… - Journal of King Saud …, 2023 - Elsevier
Over the past few years, there has been a rise in the utilization of chaotic encryption
algorithms for securing images. The majority of chaos-based encryption algorithms adhere …

An image encryption algorithm based on a 3D chaotic Hopfield neural network and random row–column permutation

W Yao, K Gao, Z Zhang, L Cui, J Zhang - Frontiers in Physics, 2023 - frontiersin.org
This study proposes a novel color image encryption algorithm based on a 3D chaotic
Hopfield neural network and random row–column permutation. First, a 3D chaotic Hopfield …

Fast colored video encryption using block scrambling and multi-key generation

KM Hosny, MA Zaki, NA Lashin, HM Hamza - The Visual Computer, 2023 - Springer
Multimedia information usage is increasing with new technologies such as the Internet of
things (IoT), cloud computing, and big data processing. Video is one of the most widely used …

Color image encryption based on 2D enhanced hyperchaotic logistic-sine map and two-way Josephus traversing

M Wang, X Wang, C Wang, S Zhou, Z **a, Q Li - Digital Signal Processing, 2023 - Elsevier
To improve the chaotic behavior of the chaotic map, this paper proposes a new two-
dimensional (2D) chaotic map, namely, 2D enhanced hyperchaotic Logistic-sine map (2D …